Skip to main content

Full text of "Military Cryptanalysis, Part I, Monoalphabetic Substitution System; 4th Edition, Friedman , Revised And Enlarged By Callimahos"

See other formats


REF ID: A5 68 95 



REOTRICTE D 



I 

SECTION VII 

MULTILITERAL SUBSTITUTION WITH SINGLE-EQUIVALENT CIPHER ALPHABETS 

i 



(In preparation) 



RESTRICTS 




• ftESTIlICTED - 



REF ID : A56895 







^ESTniCTED 



(BLANK) 



REF ID: A5 68 95 



RESTRICTED 



SECTION VIII 

MUHTILEDERAL SUBSTITUTION WITH VARIANTS 



(in preparation) 



RESTRICTED 



REF ID : A56895 



RESTRICTED 



SECTION IX 

POLYGRAPHIC SUBSTITUTION SYSTEMS 



(In preparation) 



REOTRICTED 



REF ID : A56895 



RESTRICTED 



SECTION X 
CONCLUDING REMARKS 

i 



(In preparation) 



RESTRICTED 



REF ID : A56895 




APPENDIX 1 
GLOSSARY 



(In preparation) 




REF ID: A5 68 95 



RESTRICTED 



APPENDIX 5 

LETTER FREQUENCY DATA - FOREIGN LANGUAGES 
APPENDIX 6 

LIST OF FREQUENT WORDS - ENGLISH A 1 /® FOREIGN LANGUAGES 

(in preparation) 



RESTRICTED 




REF ID : A56895 



REGTRICTE D 



(BLANK) 



RESTRICTED 



REF ID: A5 68 95 



RESTRICTE D 



APPENDIX T 

CRYPTOGRAPHIC SUPPLEMENT 
(in preparation) 



f 



RESTRICTED 



REF ID : A56895 




HEPTIUCTEP - 



REF ID : A56895 



APPENDIX 8 

LESTER S. HILL ALGEBRAIC ENCIEHERMEHT 



(in preparation) 



RESTRICTED 



REF ID : A56895 




(blabk) 




REF ID : A56895 



APPENDIX 9 

OPEN CODES AND CONCEALMEMP SYSTEMS 



(In preparation) 



REF ID: A5 68 95 



RESTRICTE D 



(BLAHK) 



R ESTRICTED 



REF ID : A56895 



RESTRICTED 



APPENDIX 10 

COMMUNICATION INTELLIGENCE OPERATIONS 
APPENDIX 11 

PRINCIPLES OF COMMUNICATION SECURITY 
(in preparation) 




REF ID: A5 68 95 



(blank) 




REF ID : A56895 




APPENDIX 12 

BIBLIOGRAPHY; RECOMMENDED READING 
(In preparation) 




REF ID : A568 95 



APPENDIX 13 

PROBLEMS - MILITARY CRYPTANALYSIS, PART I 



(in preparation) 



REF ID: A5 68 95 



RESTRICTED 



(BLAKK) 



RESTRICTED 




APPENDIX 14 i 

FOREIGN LANGUAGE PROBLEMS 

(in preparation) 




NATIONAL SECURITY AGENCY 



MILITARY CRYPTANALYSIS 

Part I 

4th Edition 



By 

WILLIAM F. FRIEDMAN 



Revised and enlarged by 
LAMBROS D. CALLIMAHOS 



National Security Agency 
Washington 25, D. C. 



December 1952 



REF ID:A56895 



The Golden Guess 
Is Moming-Star to tbe full round of Truth . 

— Tennyson. 



Preface to the 4th Edition 

This edition represents an extensive expansion and revision of die original 
text, in both scope and content, necessitated by the considerable advancement 
made in the art since the publication of the previous editions. 

1 wish to express grateful acknowledgment for Mr. Friedman’s generous 
assistance and invaluable collaboration in the preparation of this edition. 



-- L. D. C. 




ii 



REF ID: A5 68 95 



RESTRICTED 



TABLE OF CONTENTS 
MILITARY CRYPTANALYSIS, PART I 



Monoalphabctic Substitution Systems 



Section Paragraphs Pages 

I. Introductory remarks* 1-3 1-10 

II* Basic cryptologic considerations * 4-13 11 **20 

III* Fundamental cryptanalytic operations 14-20 21-30 

IV. Frequency distributions and their 

fundamental uses 21-28 31-54 

V. Uniliteral substitution with standard 

cipher alphabets.. 29-37 55-74 

VI. Uniliteral substitution with mixed cipher 

alphabets.... 38-51 75- 

VII. Multiliteral substitution with s ingle - 

equivalent cipher alphabets....... 52 - 



VIII. Multiliteral substitution with variants 

IX. Polygraphic substitution systems 

X. Concluding remarks 

APPENDICES 



1 . 

2 . 

3. 

4. 

5. 

6 . 

7. 

8 . 

9. 

10 . 

11 . 

• 12 . 

13. 

14. 

INDEX 



Glossary. 

Letter frequency data - English 

Word and pattern lists - English........ 

Service terminology; stereotypes 

Letter frequency data - foreign languages.... 

List of frequent words - English and foreign languages. 

Cryptographic supplement 

Lester S. Hill algebraic encipherment 

Open codes and concealment systems... 

Communication intelligence operations 

Principles of communication security 

Bibliography; recommended reading 

Problems - Military Cryptanalysis, Part I 

Foreign language problems 




iii 



REF ID: A5 68 95 




(BLANK) 



\ 

l 







t 

* 



REF ID: A5 68 95 

• REOTRICTED 

SECTION I 

INTRODUCTORY REMARKS 



Paragraph 



Scope of this text 1 

Mental equipment necessary for cryptanalybic work 2 

Validity of results of cryptanalysis 3 



1. Scope of this text .— e . This text constitutes the first of a 
series of six basic texts 1 on the art of cryptanalysis . Although most of 
the Information contained herein is applicable to cryptograms of various 
types and sources, special emphasis will he laid upon the principles and 
methods of solving military 2 cryptograms. Except for an introductory 
discussion of fundamental principles underlying the science of cryptana- 
lytics , this first text in the series will deal solely with the principles 
and methods for the analysis of monoalphabet ic substitution ciphers . 

Even with this limitation it will be possible to discuss only a few of the 
many variations of this one type that are met in practice; but with a 
firm grasp upon the general principles few difficulties should be expe- 
rienced with any modifications or variations that may be encountered. 

b. This and some of the succeeding texts will deal only with basic 
types of cryptosystems not because they may be encountered unmodified in 
military operations but because their study is essential to an under- 
standing of the principles underlying the solution of the modern, very 
much more complex types of codes, ciphers, and certain encrypted trans- 
mission systems that are likely to be employed by the larger governments 
of today in the conduct of their military affairs in time of war. 

c . It is presupposed that the student has no prior background in 
the field of cryptology; therefore cryptography is presented concurrently 
with cryptanalysis. Basic terminology and preliminary cryptologic consi- 
derations are treated in Section II; other terms are usually defined upon 
their first occurrence , or they may be found in the Glossary (Appendix l) . 

d. The cryptograms presented in the examples embrace messages from 
hypothetical air, ground, and naval traffic; thus, the student will have 
the opportunity to familiarize himself with the language and phraseology 
of all three Services comprising the Armed Forces of the United States • 



1 Each text has its accompanying course in cryptanalysis, so that the 
student may test his learning and develop his skill in the solution of 
the types of cryptograms treated in the respective texts. The problems 
which pertain to this text constitute Appendix 13. 

2 The word "military” is here used in its broadest sense. In this 
connection see subpar. d, below. 



1 



RESTRICTED 



REF ID: A5 68 95 



2. Mental equipment necessary for eryptanalytic work . — a. Captain 
Parker Ilitt, in the first United States Army manual^ dealing with cryp- 
tology, opens the first chapter of his valuable treatise with the 
following sentences 

"Success in dealing with unknown ciphers is measured by these four 
things in the order named: perseverance, careful methods of analysis, 

intuition, luck." 

These words are as true today as they were then. There is no royal 
road to success in the solution of cryptograms. Hitt goes on to say: 

"Cipher work will have little permanent attraction for one who 
expects results at once, without labor, for there is a vast amount of 
purely routine labor in the preparation of frequency tables, the rearrange 
ment of ciphers for examination, and the trial and fitting of letter to 
letter before the message begins to appear." 

The present author deems it advisable to add that the kind of work 
involved in solving cryptograms is not at all similar to that involved in 
solving crossword puzzles, for example. The wide vogue the latter have 
had and continue to have is due to the appeal they make to the quite 
common interest in mysteries of one sort or another j but in solving a 
crossword puzzle there is usually no necessity for performing any preli- 
minary labor, and palpable results become evident after the first minute 
or two of attention. This successful start spurs the crossword "addict" 
on to complete the solution, which rarely requires more than an hour's 
time. Furthermore, crossword puzzles are all alike in basic principles 
and once understood, there is no more to learn. Skill comes largely from 
the embellishment of one’s vocabulary, though, to be sure, constant prac- 
tice and exercise of the imagination contribute to the ease and rapidity 
with which solutions are generally reached. In solving cryptograms, 
however, many principles must be learned, for there are many different 
systems of varying degrees of complexity. Even some of the simpler 
varieties require the preparation of tabulations of one sort or another, 
which many people find irksome; moreover, it is only toward the very close 
of the solution that results in the form of intelligible text become 
evident. Often, Indeed, the student will not even know whether he is on 
the right "rad: until he has performed a large amount of preliminary 
"spade work" involving many hours of labor. Thus, without at least a 
willingness to pursue a fair amount of theoretical study, and a more than 
average amount of patience and perseverance , little skill and experience 
can be gained in the rather diff icult art of cryptanalysis . General 
Givierge, the author of an excellent treatise on cryptanalysis, remarks 
in this connection 

"The cryptanalyst 's attitude must be that of William the Silent: 

No need to hope in order to undertake, nor to succeed in order to 
persevere 



3 Hitt, Capt. Parker, Manual for the Solution of Military Ciphers . 

Army Service Schools Press. Fort Leavenworth, Kansas, 1916. 2d Edition, 
1918. (Both out of print.; 

^ Givierge, General Marcel, Cours de Cryptographic , Paris, 1925, p. 301 



- RESTRICTE D 



2 



REF ID: A5 68 95 



RESTRICTED 

b. As regards Hitt's reference to careful methods of analysis, 
before one can be said to be a cryptanalyst vorthy of the name it is 
necessary that one should have, firstly, a sound knowledge of the basic 
principles of cryptanalysis, and secondly, a long, varied, and active 
practical experience in the successful application of those principles. 

It is not sufficient to have read treatises on this subject. One month's 
actual practice in solution is worth a whole year's mere reading of 

. theoretical principles. An exceedingly important element of success in 

solving the more Intricate cryptosystems is the possession of the rather 
unusual mental faculty designated in general terms as the power of in- 

i ductive and deductive reasoning. Probably this is an Inherited father 

than an acquired faculty; the best sort of training for its emergence, 
if latent in the individual, and for its development is the study of 
the natural sciences, such as chemistry, physics, biology, geology, and 
the like. Other sciences such as linguistics, archaeology, and philology 
are also excellent. 

c. Aptitude in mathematics is quite important, more especially in 
the solution of ciphers and enciphered codes than in codebook reconstruc- 
tion, which latter is purely and simply a linguistic problem. Although 
in the early days of the emergence of the science of cryptanalytics little 
thought was given to the applications of mathematics in this field, many 
branches of mathematics and, in particular, probability and statistics, 
have now found cryptologic applications. Those portions of mathematics 
and those mathematical methods which have cryptologic applications 5 are 
known collectively as cryptomathematics . 



5 tt is quite important to stress at this point that in professional 
cryptologic work the science of cryptanalytics is subordinated to the 
art of cryptanalysis, just as in .the world of music the technical virtu- 
osity of a great violinist is adjuvant to the expression of music, that 
is, the virtuosity is a "tool" for the recovery of the complete musical 
"plain text" conceived by the composer. Since the practice of cryptana- 
lysis is an art, mathematical approaches cannot always be expected to 
yield a solution in cryptology, because art can and must transcend the 
cold logic of scientific method. By way of example, an experienced 
Indian guide can usually find his way out of a dense forest more readily 
than a surveyor equipped with all the refined apparatus and techniques 
of his profession. Likewise, an experienced cryptanalyst can generally 
find his way through a cryptosystem more readily than a pure mathematician 
equipped merely with the techniques of his field no matter how abstruse 
or refined they may be . A cryptomathematician of repute once stated 
that "the only effect of ^refined mathematical techniqueis7 is frequently 
to discourage one so much that one does nothing at all and some unmathe- 
matical ignoramus then gets the problem out in some very unethical way. 
This is intensely irritating." See also in this connection the remarks 
made in subpar. 27 e in reference to the validity of statistical tests 
in cryptanalysis. 







3 



RESTRICTED 



REF ID: A5 68 95 



d. An active imagination, or perhaps what Hitt and <?ther writers 
call intuition , is essential, hut mere imagination uncontrolled by a 
judicious spirit will he more often a hindrance than a help. In prac- 
tical cryptanalysis the imaginative or intuitive faculties must, in other 
words, he guided hy good judgment, hy practical experience, and hy as 
thorough a knowledge of the general situation or extraneous circumstances 
that led to the sending of the cryptogram as is possible to obtain. In 
this respect the many cryptograms exchanged between correspondents whose 
identities and general affairs, commercial, social, or political, are 
known are far more readily solved® than are isolated cryptograms exchanged 
between unknown correspondents, dealing with unknown subjects. It is 
obvious that in the former case there We good data upon which the intu- 
itive powers of the cryptanalyst can be brought to bear, whereas in the 
latter case no such dr>ta are available. Consequently, in the absence of 
Buch data, no matter how good the imagination and intuition of the cryp- 
tanalyst, these powers are of no particular service to him. Some writers, 
however, regard the intuitive spirit as valuable from still another 
viewpoint, as may be noted in the following; 7 

I • 

"Intuition, like a fla,sh of lightning, lasts only for a second. 

It generally comes when one is tormented by a difficult decipherment and 
when one reviews in his mind the fruitless experiments already tried. 
Suddenly the light breaks through and one finds after a few minutes what 
previous days of labor were unable to reveal." 

• This, too, is true, but unfortunately there is no way in which the 
intuition may be summoned at will, when it is most needed.® There are 
certain authors who regard as indispensable the possession of a somewhat 

6 The application in practical, operational cryptanalysis of "probable 
words" or "cribs", i.e., plain text assumed or known to be present in a 
cryptogram, is developed in time of war into a refinement the extent and 
usefulness of which cannot be appreciated by the uninitiated. Even as 
great a thinker as Voltaire found the subject of cryptanalysis stretching 
his credulity to the point that he said: 

"Those who boast that they can decipher a letter without knowing its 
subject matter, and without preliminary aid, are greater charlatans than 
those who would boast of understanding a language which they have never 
learned." — Dlctionnaire Philos ophique , under the article "Poste" . 

7 Lange et Soudart, Traite de Cryptographie, Libraire Felix Alcan, 

Paris, 1925 , p. 104 . „ rf ' 

8 The following extracts are of interest in this connection: 

“The fact that the scientific investigator works 50 per cent of his time by non-rational means is, it seems, quite 
insufficiently recognized. There is without the least doubt an instinct for research, and often the most successful 
investigators of nature are quite unable to give an account of their reasons for doing such and Buch an experi- 
ment, or for placing side by side two apparently unrelated facts. Again, one of the most salient traits ip the 
character of the successful scientific worker is the capacity for knowing that a point is proved when it would not 
appear to be proved to an outside intelligence functioning in a purely rational manner; thus the investigator 
feels that some proposition is true, and proceeds at once to the next set of experiments without waiting and wasting 
time in the elaboration of the foimal proof of the point which heavier minds would need. Questionless such a 
scientific intuition may and docs sometimes lead investigators astray, but it is quite certain that if they did 
not widely make use of it, they would not get a quarter as far as they do. Experiments confirm each other, and a 



RESTRICTED 



h 



REF ID: A5 68 95 



RESTRICTED 

rare , rather mysterious faculty that they designate by the word "flair” , 
or by the expression "cipher brains" . Even so excellent an authority as 
General Givierge , 9 in referring to this mental faculty, uses the fol- 
lowing words: 

"Over and above perseverance and this aptitude of mind which some 
authors consider a special gift, and which they call intuition, or even, 
in its highest manifestation, clairvoyance, cryptographic studies will 
continue more and more to demand the qualities of orderliness and memory." 

Although the present author believes a special aptitude for the 
work is essential to cryptanalytic success, he is sure there is nothing 
mysterious about the matter at all. Special aptitude is prerequisite to 
success in all fields of endeavor. There are, for example, thousands 
of physicists, hundreds of excellent ones, but only a handful of world- 
wide fame. Should it be said, then, that a physicist who has achieved 
very notable success in his field has done so because he is the fortunate 
possessor of a mysterious faculty? That he is fortunate in possessing a 
special aptitude for his subject is granted, but that there is anything 
mysterious about it, partaking of the nature of clairvoyance (if, indeed, 
the latter is a reality ) is not granted. While the ultimate nature of 
any mental process seems to be as complete a mystery today as it has 
ever been, the present author would like to see the superficial veil of 
mystery removed from a subject that has been shrouded in mystery from 
even before the Middle Ages down to our owe times . (The principal and 
readily understandable reason for this is that governments have always 
closely guarded cryptographic secrets and anything so guarded soon becomes 
"mysterious".) He would, rather, have the student approach the subject 
as he might approach any other science that can stand on its own merits 
with other sciences, because cryptanalytics, like other sciences, has a 
practical importance in human affairs. It presents to the inquiring mind 
an interest in its own right as a branch of knowledge; it, too, holds 
forth many difficulties and disappointments, and these are all the more 



false step is usually soon discovered. And not only by this partial replacement of reason by intuition does the 
work of science go on, but also to the born scientific worker — and emphatically they cannot be made — the struc- 
ture of the method of research is as it were given, he cannot explain it to you, though he may be brought to agree 
a posteriori to a formal logical presentation of the way the method works”. — Excerpt from Needham, Joseph, 
The Sceptical Biologist f London, 1929, p. 79. 

“The essence of scientific method, quite simply, is to try to see how data arrange themselves into causal 
configurations. Scientific problems are solved by collecting data and by “thinking about them all the time.” 
We need to look at strange things until, by the appearance of known configurations, they seem familiar, and to 
look at familiar things until we see novel configurations which make them appear strange. We must look at 
events until they become luminous. That is scientific method . . . Insight is the touchstone . . . The appli- 
cation of insight as the touchstone of method enables us to evaluate properly the role of imagination in scientific 
method. The scientific process is akin to the artistic process: it is a process of selecting out those elements of 
experience which fit together and recombining them in the mind. Much of this kind of research is simply a cease- 
less mulling over, and even the physical scientist has considerable need of an armchair . . . Our view of scien- 
tific method as a struggle to obtain insight forces the admission that science is half art . . , Insight is the 
unknown quantity which has eluded students of scientific method”. — Excerpts from an article entitled Insight and 
Scientific Method , by Willard Waller, in The American Journal of Sociology , Vol. XL, 1934*. 

9 Op. clt ., p. 302. 



RESTRICTED 



5 




RESTRICRBfr 



REF ID: A5 68 95 



keenly fell when the nature. of these difficulties is not understood hy 
those unfamiliar with the special circumstances that very often are the 
real factors that led to success in other cases. Finally, just as in 
the other sciences wherein men labor long and earnestly for the true 
satisfaction and pleasure that comes from work well done, so the mental 
pleasure that the successful cryptanalyBt derives from his accomplish- 
ments is very often the only reward for much of the drudgery that he must 
do in his daily work. General Givierge's words in this connection are 
well worth quoting: 10 

"Some studies will last for years before bearing fruit. In the case 
of others, cryptanalysts underbaking them never get any result. But, for 
a cryptant l /at who likes the work, the Joy of discoveries effaces the 
memory of bis hours of doubt and impatience." 

o. Willi his usual deft touch, Hitt says of the element of luck, as 
regards the role it plays in analysis: 

"As to luck, there is the old miners’ proverb: 'Gold is where you 

find it.’" 

The cryptanalyst is lucky when one of the correspondents whose cryp- 
tograms he is studying makes a blunder that gives the necessary clue; or 
when he finds two cryptograms identical in text but in different keys in 
the same system; or when he finds two cryptograms identical in text but 
in different systems, and so on. The element of luck is there, to be 
sure, but the cryptanalyst must be on the alert if he is to profit by 
these lucky ‘'breaks". ~ 

f . If the present author were asked to state, in view of the pro- • 
gress”in the field since 1916, what elements might be added to the four 
ingredients Hitt thought essential to cryptanalytic success, he would 
be inclined to mention the following: 

(1) A broad, general education, embodying interests covering as 
many fields of practical knowledge as possible. This is useful because 
the cryptanalyst is often called upon to solve messages dealing with 
the most varied _r human activities, and the more he knows about these 
activities, the easier his task. 

(2) Access- to a large library of current literature, and wide and 
direct contacts with sources of collateral information. These often' 
afford clues afe to the contents of specific messages. For example,, to 
be able instantly to have at his disposal a newspaper report or a 
personal report of events described or referred to in a message under 
investigation goes a long way toward simplifying or facilitating 
solution. Government cryptanalysts are sometimes fortunately situated 
in this respect, especially where various agencies work in harmony. 

(3) Proper coordination of effort. This includes the organization 
of cryptanalytic personnel into harmonious, efficient teams of cooperating 
individuals . 



1° Op. cit ., p. 301. 



RESTRICTED 



6 



REF ID : A56895 



RESTRICTED 

(!») Under mental equipment be would also include tbe faculty of 
being able to concentrate on a problem for rather long periods of time, 
without distraction, nervous irritability, and impatience . The strain 
under which cryptanalytic studies are necessarily conducted is quite 
severe and too long -continued application has the effect of draining 
nervous energy to an unwholesome degree, so that a word or two of caution 
may not here he out of place. One should continue at work only so long 
as a peaceful, calm spirit prevails, whether the work is fruitful or not. 
But just as soon as the mind becomes wearied with the exertion, or just 
as soon as a feeling of hopelessness or mental fatigue intervenes, it is 
better to stop completely and turn to other activities, rest, or play. 

It is essential to remark that systematization and orderliness of work 
are aids in reducing nervous tension and irritability. On this account 
it is better to take the time to prepare the data carefully, rewrite the 
text if necessary, and so on, rather than work with slipshod, incomplete, 
or improperly arranged material. 

(5) A retentive memory is an important asset to cryptanalytic skill, 
especially in the solution of codes. The ability to remember individual 
groups, their approximate locations in other messages, the associations 
they form with other groups, their peculiarities and similarities, saves 
much wear and tear of the mental machinery, -as well as much time in 
looking up these groups in indexes . 

(6) The assistance of machine aids in cryptanalysis. The importance 
and value of these aids cannot be overemphasized in their hearing on prac- 
tical, operational cryptanalysis, especially in the large-scale effort 
that would be made in time of war on complex, high-grade cryptosystems at 
a theater headquarters or in the zone of the interior. These aids, under 
the general category of rapid analytical machines, comprise both punched- 
card tabulating machinery and certain other general- and special-purpose 
high-speed electrical and electronic devices. Some of the more compact 
equipment may be employed by lower echelons within a theater of operations 
to facilitate the cryptanalysis of medium-grade cryptosystems found in 
tactical communications . 

g. It may he advisable to add a word or two at this point to prepare 
the student to expect slight mental jars and tensions which will almost 
inevitably come to him in the conscientious study of this and the sub- 
sequent texts. The present author is well aware of the complaint of 
students that authors of texts on cryptanalysis base much of their expla- 
nation upon their foreknowledge of the "answer" —which the student does 
not know while he is attempting to follow the solution with an unbiased 
mind. They complain, too, that these authors use such expressions as "it 
is obvious that", "naturally", "of course", "it is evident that", and 
so on, when the circumstances seem not at all to warrant their use. 

There is no question that this sort of treatment is apt to discourage 
the student, especially when the point elucidated becomes clear to him 
only after many hours' labor, whereas, according to the hook, the author 
noted the weak spot at the first moment’s inspection. The present 
author can only promise to try to avoid making the steps appear to be 
much more simple than they really are, and to suppress glaring instances 



RESTRICTED 



7 




RESTRICTED 



REF ID: A5 68 95 



of unjustifiable "jumping at conclusions". At the same time he must 
indicate that for pedagogical reasons in many cases a message has been 
consciously "manipulated" so as to allow certain principles to become 
more obvious in the illustrative examples than they ever are in practical 
work. During the course of some of the explanations attention will even 
be directed to cases of unjustified inferences . Furthermore , of the 
student who is quick in observation and deduction, the author will only 
ask that he bear in mind that if the elucidation of certain principles 
seems prolix and occupies more space than necessary, this is occasioned 
by the author's desire to carry the explanation forward in very short, 
easily-comprehended, and plainly-described steps, for the benefit of 
students who are perhaps a bit slower to grasp but who, once they under- 
stand, are able to retain and apply principles slowly learned just as 
well, if not better than the students who learn more quickly.-'--'- 

3. Validity of results of cryptanalysis .--Valid or authentic 
cryptanalytic solutions cannot and do not represent "opinions" of the 
cryptanalyst. They are valid only so far as they are wholly objective, 
and are susceptible of demonstration and proof, employing authentic, 
objective methods. It should hardly be necessary (but an attitude fre- 
quently encountered among laymen makes it advisable) to indicate that 
the validity of the results achieved by any serious cryptanalytic studies 
on authentic material rests upon the same sure foundations and are 
reached by the same general steps as the results achieved by any other 
scientific studies; viz. , observation, hypothesis, deduction and induction, 
and confirmatory experiment. Implied in the latter is the possibility 
that two or more qualified investigators, each working independently 
upon the same material, will achieve identical (or practically identical) 
results — there is one and only one (valid) solution to a cryptogram. 
Occasionally a "would-be" or pseudo-cryptanalyst offers "solutions" which 
cannot withstand such tests; a second, unbiased, investigator working 
independently either cannot consistently apply the methods alleged to 
have been applied by the pseudo-cryptanalyst, or else, if he can apply 



In connection with the use of the word "obvious", the following 
extract is of interest: 

"Now the word 'obvious' is a rather dangerous one. There is an 
incident, vhieh has become something of a legend in mathematical circles, 
that illustrates this danger. A certain famous mathematician was lec- 
turing to a group of students and had occasion to use a formula which he 
wrote down with the remark, 'This statement is obvious . ' Then he paused 
and looked rather hesitantly at the formula. 'Wait a moment, ' he said. 

'Is it obvious? I think it's obvious.' More hesitation, and then, 

'Pardon me, gentlemen, I shall return.* Then he left the room. Thirty- 
five minutes later he returned; in his hands was a sheaf of papers 
covered with calculations, on his face a look of quiet satisfaction. 

*1 was right, gentlemen. It is obvious,' he said, and proceeded with his 
lecture." — Excerpt from The Anatomy of Mathematics by Kershner and Wilcox. 
New York, 1950. 



RESTRICTED 



8 



REF ID : A56895 



■ RE STRICT E S~ 

them at all, the results (plaintext translations) are far different in 
the two cases. The reason for this is that in such cases it Is generally 
found that the "methods", are not clear-cut, straightforward or mathema- 
tical in character. Instead, they often involve the making of judgments 
on matters too tenuous to measure, weigh, or otherwise subject to careful 
scrutiny. Often, too, they involve the "correction" of an inordinate 
number of "errors" which the pseudo -cryptanalyst assumes to he present and 
which he "corrects" in order to make his "solution" intelligible. And 
sometimes the pseudo -cryptanalyst offers as a "solution" plain text which 
is intelligible only to him or which he makes intelligible by expanding 
what he alleges to be abbreviations, and so on. In all such cases, the 
conclusion to which the unprejudiced observer is forced to come is that 
the alleged "solution" obtained by the pseudo-cryptanalyst is purely 
subjective In nearly all cases where this has happened (and they occur 
from time to time) there has been uncovered nothing which can in any way 



12 a mathematic ian is often unable to grasp the concept behind the ex- 
pression "subjective solution" as used in the cryptanalytic field, since 
the idea is foreign to the basic philosophy of mathematics and thus the 
expression appears to him to represent a contradiction in terms. As an 
illustration, let us consider a situation in which a would-be cryptanalyst 
offers a solution to a cryptogram he alleges to be a simple monoalphabetic 
substitution cipher. His so-called solution, however, requires that he 
assume the presence of, let us say, approximately 50 $ garbles (which he 
claims to have been introduced by cipher clerks’ errors, faulty radio 
reception because of adverse weather conditions, etc.). That is, the 
"plain text" he offers as the "solution" involves his making helter- 
skelter many "corrections and emendations", which, one maybe sure, will 
be based on what his subconscious mind expects or desires to find in the 
cleartext message. Unfortunately, another would-be cryptanalyst working 
upon the same cryptogram and hypothesis independently might conceivably 
"degarble" the cryptogram in different spots and produce an entirely 
dissimilar "plain jbext" as his "solution" . Both "solutions" would be 
invalid because they are based upon an erroneous hypothesis — the crypto- 
gram actually happens to be a polyalphabetic substitution cipher which 
when correctly analyzed requires on the part of unbiased observers no 
assumption of garbles to a degree that strains their credulity. The 
last phrase is added here because in professional cryptanalytic work it 
is very often necessary to make a few corrections for errors but it is 
rarely the case that the garble rate exceeds more than a few percent of 
the characters of th^ cryptogram, say 5 to 10$ at the outside. It is 
to be noted, however, that occasionally the solution to a cryptogram 
may Involve the correction of more than this percentage of errors, but 
the solution would be regarded as valid only if the errors can be shown 
to be systematic in some significant respect, or can otherwise be 
explained by objective rationalization. 




RESTRICTED 



RESTRICTED 



REF ID: A5 68 95 



"be used to impugn the integrity of the pseudo-crypts nalyst . The worst 
that can he said of him ic that La has become a victim of a special or 
peculiar form of self-delusion, and that his desire to solve the problem, 
usually in accord with some previously-formed opinion, or notion, has 
over -balanced, or undermined, his judgment and good sense .^3 



Specific reference can be made to the following typical ’’case 
histories" : 

Donnelly, Ignatius, The Great Cryptogram . Chicago, 1888. 

Owen, Orville W., Sir Francis Bacon's Cipher Story . Detroit, 1895* 
Gallup, Elizabeth Wells, Francis Bacon's Biliteral Cipher * 

Detroit, 1900. 

Arensborg-, Walter Conrad, The Cryptography of Shakespeare . Los 
Angeles, 1922. 

The Shakespearean Mystery . Pittsburgh, 1928. v 

The Baconian Keys . Pittsburgh, 1928. 

Margoliouth, D. S., The Homer of Aristotle . Oxford, 1923* 

Newbold, William Romaine, The Cipher of Roger Bacon . Philadelphia, 
1928. t(For a scholarly and complete demolition of Professor 
Newbold'' s work, see an article entitled Roger Bacon and the 
Voynich 'MS, by John M. Manly, in Speculum, Vol. VI, No. 3, 

July 1931.) 

Feely, JoBeph Martin, The Shakespearean Cypher . Rochester, N. Y., 
1931. 

Deciphering Shakespeare . Rochester, N. Y., 193^ • 
koger Bacon’s Cypher: the right key found . Rochester, N. Y., 19^3* 
Wolff, Werner, Dlchiffrement de l'Ecriture Maya . Paria, 1938. 

Strong, Leonell C., Anthony Askham, the author of the Voynich 
manuscript , in Science , Vol. 101, June 1$, 19^5 , PP. 608-9. 



RESTRICTED 



10 



REF ID : A56895 



HEDTRICTE& 



SECTION II 

BASIC CKXFTGLOGIC CONSIDERATIONS 



Cryptology, communication intelligence, and communication 
security e ***»*****•*«*«*•• »**-**»**«-»*. ***4-****tf*4^****aa 


Paragraph 

..**** k 


Seer nnrmmirvf rwki an 


...... * 


Plftltt fl.nrS . ? 6 


CrVDtOd , &'Dh‘V’ a encrvntinfif A anfl. Ae(5!l*VDtlllXf A -**»*a* ************** 


...... 7 


Godina * olnTiAVri * smfl Avtrt'f'nhoivkA aa/Ia . . u . , . . . , .i. 


fl 


ftftRftMl avaf.Ain * a Vav _ nnri Awm+.nsvn+.Aiti 0 


Cl^Yotanalvt ic a cifvotanalvfiis 


A A A A * A jQ 


TranSDOfiltiOn a-tlfl SUb S t ittlt ion - 




Kcfbure of alphabet a 


...... ’■ is 


Types of alphabets * 





4. Cryptology* communication Intelligence « and communication 
aecurlty . Ime oeeaSSSnaT or frequent peed for secrecy Ini the conduct of 
important affairs has been recognized from time Immemorial* In the case 
of diplomacy and organized warfare this need Is especially Important In 
regard to communications* . However, when such communications are trans- 
mitted by electrical means, they can be heard and copied by unauthorized 
persons* The protection resulting from, all measures designed to deny 
to unauthorized persons information of value which may be derived from 
such communications Is called communication security . The evaluated 
Information concerning the enemy, derived principally from a study of his 
electrical communications, is called communication intelligence * The col-} 
lective term Including all phases of communication intelligence and com- 
munication security is cryptology .3- Or, stated in broad terms, cryptology 
is that branch of knowledge which treats of hidden, disguised, or secret^ 
communications * 



A From the Greek kryptos (hidden) 4* logos (learning)* The prefix 
"crypto-" in compound words pertains to ^cryptologic", "cryptographic". 

Or "crypt analytic" , depending upon the use of the particular .word as 
defined* 

2 In this text the term "secret" will be used in its ordinary sense 
as given in the dictionary* Whenever the designation is used in the more 
restricted sense of the security classification as defined in official 
regulations, it will be capitalized. There are In current use the four 
classifications Restricted. Confidential. Secret, and Top Secret, listed 
in ascending order of degree. 



REOTRICTEP 



11 




REF ID: A5 68 95 



riEauur'H se- 

5» Secret coiiin)mlcation »«»«a. Communication may “be conducted by 
any me axis susceptible oS ultimate interpretation by one of the five 
senses, but those most commonly used are sight and bearing. Aside from 
the use of simple visual and auditory signals for communication over 
relatively short distances, the uaual method of communication between 
or among individuals separated from one another by relatively long dis- 
tances involves, at one stage or another, the act of writing or of 
speaking over a telephone. 

b. Privacy or secrecy in communication by telephone can be obtained 
by using equipment which affects the electrical currents Involved in te- 
lephony so that the conversations can he understood only by persons pro- 
vided with suitable equipment properly arranged for the purpose. The 
same thing is true in the case of electrical transmission of pictures, 
drawings, maps, and television Images* However, this t eat will not treat 
of these aspects3 of cryptology. 

c. Writing may be either visible or invisible . In the former, the 
characters are inscribed with ordinary writing materials and can be seen 
with the naked eye; in the latter, the characters are inscribed by means 
or methods which make the writing Invisible to the naked eye. Invisible 
writing can be prepared with certain chemicals called invisible, sympa- 
thetic, or secret inks, and in order to "develop" such writing, that is, 
make It visible, special processes must usually be applied. There are 
also methods of producing writing which is invisible to the naked eye 
because the characters are of microscopic size, thus requiring special 
photographic or microscopic apparatus to make such writing visible to the 
naked eye. 

d. Invisible writing and unintelligible visible writing constitute 
secreF writing . 

6. Plain teacfc and encrypted text *— a. Visible writing which is 
intelligible, that is, conveys a more or Tees understandable or sensible 
meaning (in the language in which written) and which is not intended to 
convey a hidden meaning, is said to be in plain text . 1 * A message in 
plain text is termed a plaintext message, a cleartext message, or a 
mea sage in clear. 



3 These aspects of cryptology are now known as ciphony (from cipher + 
tele phony) ; clfax (from cip her + facsi mile); and clviBlon (from cipher + 
tel evision) • 

^ Visible writing may be Intelligible but the meaning It obviously 
conveys may not be its real meaning, that is, the meaning intended to be 
conveyed. To quote a simple example of an apparently innocent message 
containing a secret or hidden meaning, prepared with the intention of es- 
c aping censorship, the sentence "Son bom today" may mean "Three trails-'' 
ports left today." Messages of this type are said to be In open code. - 
Secret communication methods or artifices of this sort (concealment sys- 
tems) are impractical for field military use but are often encountered 
in espionage and counter-espionage activities . 



REffTIilCTE fr 



12 



REF ID : A56895 



RESTRICTED 

b. visible -writing -which conveys no intelligible meaning In any 
recognized language? is said to be In encrypted text and such writing la 
termed a cryptogram .” 

7» Cryptography , e ncryptin g, a nd dec rypting , —a. Cryptography I® 
that branch of crOTwlogy'wnich treats oFvaxfous means/ Toeth^s, am 
apparatus for con-verting or transforming plaintext messages into crypto- 
grams and for reconverting the cryptograms into their original plaintext 
forms by a sinple reversal of the steps used in their transformation. 

b. To encrypt la to convert or transform a plaintext message into 

a cryptogram by following certain rules, steps, or processes constituting 
the key or keys and agreed upon in advance by correspondents, or furnished 
them by higKer authority* 

c. To decrypt is to reconvert or to transform a cryptogram into the 
original equivalent' plaintext message by a direct reversal of the en- 
crypting process, that is, by applying' to the cryptogram the key or keys 
\ dually in a" reverse order) ^used. in producing the cryptogram* 

d . A person skilled in the’ art of encrypting and decrypting, or one 
who has a part in devising a cryptographic system is called a crypto- 
grapher; a clerk who encrypts and decrypts, or who assists in such work, 
is called a cryptographic clerk . 

8. Codes, ciphers, a nd enciphered code .— a. Encrypting and de- 
crypting are accoiiplished^y means c ollec£ively r ’ designated as codes and 
ciphers . Such means are used for either or both of two purposes: (1) se- 

crecy, and (2) economy or brevity. Secrecy usually is far more Important 
in military cryptography than economy or brevity. In ciphers or cipher 
systems* cryptograms are produced by applying the cryptographic treatment 
to "individual letters of the plaintext messages, whereas, in codes or code 
systems, cryptograms are produced by applying the cryptographic treatment 
to entire words, phrases, and sentences of the plaintext messages. The 
specialized meanings of the terms code and cipher are explained in detail 
later. 

b. A cryptogram produced by means of a cipher system is said to be 
in cipher and is called a cipher message, or sometimes sitply a cipher . 

®J&e act or operation of encrypting a cipher message is called enciphering, 

* There is a certain type of writing which is considered by its authors 
to be intelligible, but which is either completely unintelligible to the 
wide variety of readers or else requires considerable mental struggle on 
their part to make it intelligible. Reference is here made to so-called 
"modern literature" and "modem verse", products of such writers as 
E. E. Cummings, Gertrude Stein, James Joyce, et al. 

’ ^ From kryptos + gramma (that which is written). Analogous terminol- 
ogy would call' 'a' plaintext message a phanerogram ( phaneros 3 visible, 
manifest, open). 



RESTRICTED 



13 



REF ID: A5 68 95 



RESTRICTED 

and the enciphered version of the plain test, as veil as the act or pro- 
cess itself, is often referred to as the encipherment * The cryptographic 
clerk vho performs the process serves as an encipherer * The corresponding 
terms applicable to the decrypting of cipher messages are deciphering* 
decipherment* and decipherer * A clerk vho serves as both an encipherer 
ancT decipherer of messages is called a cipher clerk * 

c. A cipher device is a relatively simple mechanical contrivance for 
encipHermenb and decipherment, usually "hand-operated" or manipulated by 
the fingers, as for example a device vith concentric rings of alphabets, 
manually povered; a cipher machine is a relatively complex apparatus or 
mechanism for encipherment and decipherment, usually equipped with a 
typewriter key board and often requiring an external power source. 

d* A cryptogram produced by means of a code system is said to be In 
code and is called a code message . The text of the cryptogram is referred 
to as code text . This act or operation of encrypting is called encoding* 
and the encoded version of the plain text, as well as the act or process 
Itself, is referred to as the encodement . The clerk who performs the pro- 
cess serves as an encoder . The corresponding terms applicable to the 
decrypting of code messages are decoding* decodement* and decoder . A 
cryptographic clerk who serves as both an encoder and decoder of messages 
is called a code clerk . 

e. Sometimes, for special purposes (usually increased security), 
the ccTde text of a cryptogram undergoes a further step in concealment 
involving superencryption , that is, encipherment of the characters com- 
prising the code text, thus producing what is called an enciphered-oode 
message* or enciphered code . Encoded cipher, that is, the case where the 
filial cryptogram is produced by enciphering the plain text and then en- 
coding the cipher text obtained from the first operation, is also possible, 
but rare. 

9. General system* specific key* and cryptosystem .— a. There are 
a great many different methods of emr^tihg messages, so that correspon- 
dents must first of all be in complete agreement as to which of them will 
be used in their secret communications, or in different types or classes 
of such communications. Furthermore, it is to be understood that all the 
detailed rules, processes, or steps comprising the cryptography agreed 
Upon will be invariant* that is, constant or unvarying in their use in a 
given set of communications. The totality of these basic, invariable 
rules, processes, or steps to be followed in encrypting a message according 
to the agreed method constitutes the general cryptographic system or, more 
briefly, the general system . 

b. It is usually the case that the general system operates in con- 
nection with or under the control of a number, a group of letters, a word, 
a phrase, or sentence which is used as a key* that is, the element which 
specifically governs the manner in which the general system will be applied 
in a specific message, or the exact setting of a cipher device or a cipher 
machine at the initial point of encipherment or decipherment of a specific 



RESTRICTED 



14 



REF ID: A5 68 95 



• REDTRICTED ■ 

message. This element — usually of a variable nature or changeable at the 
will of the correspondents, or prearranged for them by higher authority— 
Is called the specific key . The specific key may also Involve the use of 
a set of specially prepared tables, a special document, or even a book. 

£. The term cryptosystem? is used when It Is desired to designate 
or refer to all the cryptomaterial (device, machine, Instructions for use, 
key lists, etc.) as a unit to provide a single, complete system and means 
for secret communication. 

10. Gryptanalytlc s and cryptanalysis .— a. In theory any cryptosystem 

(except one**) can be "broken", l.e., solved, If enough time, labor, and 
skill are devoted to It, and if the volume of traffic in that system Is ' 
large enough. This can be done even if the general system and the sped* 
fic key are unknown at the start. In military operations theoretical 
rules must usually give way to practical considerations. How the theo- 
retical rule in this case Is affected by practical considerations will 
be discussed in Appendix 11. 

b. That branch of cryptology which deals with the principles, 
methods, and means employed in the solution or analysis of cryptosystems 
is called cryptanalytics . 



c. The steps and operations performed in applying the principles of 
cryptanalytics constitute cryptanalysis . To cryptanalyze a cryptogram 
is to solve it by cryptanalysis. 




11. Transposition and substitution .— a. Technically there are only 
two distinct types' of' treatment which! may Fe applied to written plain 
text to convert it into secret text, yielding two different classes of 
cryptograms. In the first, called transposition, the elements or units 
of the plain text retain their original identities and merely undergo 
some change in their relative positions, with the result that the original 
text becomes unintelligible . In the second, called substitution, the 
elements of the plain text retain their original relative positions but 
are replaced by other elements with different values or meanings, with 
the result that the original text becomes unintelligible. Thus, in the 
case of transposition ciphers, the unintelligibility is brought about 
merely by a change in the original sequence of the elements or units of 

Y The term cryptosystem is used in preference to cryptographic system 
so as to permit its use in designating secret communication' systems 
involving means other than writing, such as clphony and clfax. 

®..The exception is the "one-time” system in Which the key is used only 
once and in itself must have no systematic construction, derivation, or 
meaning. 



RESTRICT E B 



15 




RESTRICTED 



REF ID : A56895 



the plain text; In the case of substitution ciphers, the unintelllgi- 
bility is brought about by a change in the elements or units themselves, 
■without a change in their relative order* 

b* It is possible to encrypt a message by a substitution method and 
then to apply a transposition method to the substitution text, or vice 
versa* Such combined transposition-substitution methods do not form a 
third class of methods* They are occasionally encountered in military 
cryptography, but the types of combinations that are sufficiently simple 
to be practicable for field vise are very limited *9 _ 

c. Under each of the two principal classes of cryptograms as out- 
Uned*~above, a further classification can be made based upon the number 
of characters composing the textual elements or units undergoing crypto- 
graphic treatment. These textual units are composed of (1) individual 
letters, (2) combinations of letters in regular groupings, (3) combina- 
tions of letters in Irregular, more or less euphonious groupings called 
syllables, and (4) complete words, phrases, and sentences* Methods which 
deal with the first type of units are called monographic methods; those 
which deal with the second type are called polygraphia ( digraphic , trl- 
grephic, etc*); those which deal with the third type, or syllables, are 
called syllabic; and, finally, those which deal with the fourth type are 
called lexical (of or pertaining to words)* 

d* It is necessary to indicate that the foregoing classification of 
cryptographic methods is more or less artificial in nature, and is estab- 
lished for purpose of convenience only. No sharp line of demarcation can 
be drawn in every case, for occasionally a given system may combine me- 
thods of treating single letters, regular or irregular-length groupings 
of letters, syllables, words, phrases, and complete sentences* When in 
a single system the cryptographic treatment is applied to textual units 
of regular length, usually monographic or digraphic (and seldom longer, 
or intermixed monographic and digraphic), the system is called a cipher 
system . Likewise, when in a single system the cryptographic treatment is 
applied to textual units of irregular length, usually syllables, whole 
words, phrases, and sentences, and is only exceptionally applied to single 
letters or regular groupings of letters, the system is called a code 
system and generally involves the use of a code book . 10 

12* Nature of alphabets .— a. One of the simplest kinds of cubstitu- 
tlon ciphers is that which is Known in cryptologic literature as Julius 
Caesar* s Cipher, but fthlch, as a matter of fact, was a favorite long 
before his day* In this cipher each letter of the text of a message is 
replaced by the letter standing the third to the right of it in the 



9 one notable exception is the ADFGVX system, used extensively by the 
Germans in World War I* See in this connection the Cryptographic 
Stpplement (Appendix 7) • 

10 A list of single letters, frequent digraphs, tri graphs, syllables, 
and words is often called a syllabary; cryptographic treatment of the 
units of such syllabaries places ■them in the category of code systems* 



RESTRICTED 



16 



REF ID: A5 68 95 



RESTRICTED 

ordinary alphabet; the letter A is replaced by D, the letter B by E, 
and so on. The word cab becomes converted into FDE, which is cipher. 

b. The English language is written by means of 26 simple characters 
called letters which, taken together and considered as a sequence of 
symbols'/ ' constitute the alphabet of the language. Not all systems of 
writing are of this nature. Chinese writing is contposed of about Mj-, 000 
complex characters, each representing one sense of a word. Whereas 
English words are composite or polysyllabic and may consist of one to 
eight or more syllables, Chinese words are all monosyllables and each 
monosyllable is e word. Written languages of the majority of other 
civilized peoples of today are, however, alphabetic and polysyllabic in 
construction, so that the principles discussed here apply to all of them. 

£» The letters comprising the English alphabet used today are the 
results of a long period of evolution, the complete history of which may 
never fully be known. 11 They are conventional symbols representing 
elementary sounds, and any other simple symbols, so long as the sounds 
which they represent are agreed upon by those concerned, will serve the 
purpose equally well. If taught from early childhood that the symbols 
$, *, and @ represent the sounds “Ay", "Bee", and "See" respectively, the 
combination @$* would still be pronounced cab, and would, of course, have 
exactly the same meaning as before. Again, let us suppose that two per- 
sons have agreed to change the sound values of the letters F, G, and H, 
and after long practice have become accustomed to pronouncing them as we 
pronounce the letters A, B, and C, respectively; they would then write 
the "word" HPG, pronounce it cab, and see nothing strange whatever in the 
matter. But to others no party to their arrangements, BFG constitutes 
cipher. The combination of sounds called for by this combination of 
symbols is perfectly intelligible to the two who have adopted the new 
sound values for those symbols and therefore pronounce HFG as cab; but 
HPG is utterly unpronounceable and wholly unintelligible to others who 
are reading it according to their own long-established system of sound 
and symbol equivalents. It would be stated that there is no such word 
as BFG, which would mean merely that the particular combination of sounds 
represented by this combination of letters has not been adopted by con- 
vention to represent a thing or an idea in the English language. Thus, 
it is seen that, in order for the written words of a language to be 
pronounceable and intelligible to all who speak that language, it is 
necessary, first, that the sound values of the letters or symbols be 
universally understood and agreed upon and, secondly, that the particular 
combination of sounds denoted by the letters should have been adopted to 
represent a thing or an idea. Spoken plain language consists of vocables; 
that is, combinations and permutations of elementary speech-sounds which 
have by long usage come to be adopted and recognized as representing 
definite things and ideas. Written plain language consists of words; 
that is, combinations and permutations of simple symbols, called letters, 
which represent visually and call forth vocally the elementary speech- 
sounds of which the spoken language is composed. 



n 4 

An excellent and most authoritative book on this subject is The Al- 

phabet; a key to the history of Mankind by David Diringer. London, lykty* 




REF ID : A56895 



- RESTRICTED - 

d. It Is clear also that In order to -write a polysyllabic language 
with Facility it is necessary to establish and to maintain by common 
agreement or convention, equivalency between two sets of elements, first, 
a set of elementary sounds and, second, a set of elementary symbols to 
represent the sounds. -When this is done the result is what is called an 
alphabet, a word derived from the names of the first two letters of the 
Greek alphabet, "alpha” and "beta". 

e. Theoretically, in an ideal alphabet each symbol or letter would 
denote only one elementary sound, and each elementary sound would inva- 
riably be represented by the same symbol. But such an alphabet would be 
far too difficult for the average person to use. It has been conserva- 
tively estimated that a minimum of 100 characters would be necessary for 
English alone. Attempts toward producing and introducing into usage a 
practical, scientific alphabet have been made, one being that of the 
Simplified Spelling Board in 1928, which advocated a revised alphabet of 
42 characters* Were such an alphabet adopted into current usage, in 
books, letters, telegrams, etc., the flexibility of cryptographic systems 
would he considerably extended and the difficulties set in the path of 
the enemy cryptanalysts greatly increased. The chances for its adoption 
in the near future are, however, quite small. Because of the continually 
changing nature of every living language, it is doubtful whether an 
initially "perfect alphabet" could, over any long period of time, remain 
so and serve to indicate with great precision the exact sounds which it 
was originally designed to represent. 

13 . Types of alphabets .— a. In the study of cryptography the dual 
nature' of the alphabet becomes*”apparent. It consists of two parts or 
components, (l) an arbitrarily-arranged sequence of sounds, and (2) an 
arbitrarily-arranged sequence of symbols. 

b. The normal alphabet for any language is one in which these two 
components are the' ordinary' sequences that have been definitely fixed by 
long usage or convention. The dual nature of our normal or everyday 
alphabet is often lost sight of. When we write A, B, C,... we really 
mean: 

Sequence of sounds: "Ay" "Bee" "See" .... 

Sequence of symbols: A B C .... 

Normal alphabets of different languages vary considerably in the number 
of characters composing them and the arrangement or sequence of the 
characters. The English, Dutch, and German alphabets each have 26 ; the 
French. 25; the Italian, 21; the Spanish, 27 (including the digraphs CH 
and Ii); and the Russian, 31 . - 1 - 2 The Japanese language has a syllabary 
consisting of 72 syllabic sounds which require 48 characters for their 
representation. 

In contrast to the foregoing alphabets, it is of interest to note 
that in the Hawaiian language the alphabet consists of only 12 letters, 
viz , the five vowels A, E, I, 0, U, and the seven consonants H, K, L, 

M, N, P, W. 



RESTRICTED 



18 



REF ID : A568 95 




REF ID: A5 68 95 



RE S TRICTED 



SECTION III 

FUNDAMENTAL CRIFTANALKEIC OPERATIONS 

Paragraph 



The role of cryptanalysis in communication Intelligence 

operations * l4 

The four basic operations in cryptanalysis 1? 

The determination of the language employed.. 1 6 

The determination of the general system..... 17 

The reconstruction of the specific ke^. 18 

The reconstruction of the plain text..!. ••••• 19 

The utilization of traffic intercepts J 20 



l4. The role of cryptanalysis in communication intelligence 
operations . — a." Through the medium of cozmnunication intelligence an at- 
tempt is made""to answer three questions concerning enemy communications: 
"Who?" "Where?” "What?" — Who are their originators and addressees? 

Where are these originators and addressees located? What do the messages 
say? 

b. All of the foregoing' questions are very important in the military 
application of communication intelligence'. Hence, even though this text 
deals almost exclusively with the principles and operations involved in 
deriving the answer to the third question — "What do the messages say?" — 
a few words on the importance of the first and second questions may be 
useful. _It is a serious mistake to thick that one can necessarily and 
always correctly Interpret the mere text of a message without identifying 
and locating the originator and the addressee or, on many occasions, with- 
out having a background against which to interpret the message in order 
to appreciate its real import or significance. 

£. The very first step in the series of activities involved in de- 
riving communication intelligence is the collection of the raw material, 
that is, the interception^ - and copying of the transmissions constituting 
the messages to be studied and analyzed. 

d. Then, with the raw material in hand, studies are made in order 
to answer the first two questions — "Who?" and "Where?" The answers to 
these questions are not always obvious in modern military communications, 
especially in the case of messages exchanged by units in the combat zone, 
since messages of this sort rarely Indicate in plain language who the 



1 Intercept means, in its cryptologic sense, to gain possession of 
communications which are intended for other recipients, without obtaining 
the consent of these addressees and without preventing or ordinarily 
delaying the transmission of the communications to them. 



21 



REF ID: A5 68 95 



RESTRICTED 

originator and the addressee are or vfaere they are located. Consequently, 
certain apparatus and techniques specifically developed for finding the 
answers to these questions must he employed. These apparatus and tech- 
niques are embraced by that part of communication intelligence theory and 
practice which is known as traffic analysis . This latter subject and 
interception are treated briefly in Appendix 10, "Communication intelli- 
gence operations” . (The serious student will derive much practical 
benefit from a careful reading of this appendix.) 

e. The foregoing operations, interception and traffic analysis, 
along"" with cryptanalysis constitute the first three operations of commu- 
nication intelligence. But generally there must follow at least one addi- 
tional operation. If the plain texts recovered through cryptanalysis are 
in a foreign language, they must usually be translated, and translation 
constitutes this fourth operation. In the course of translating, it may 
be found that, because of errors in transmission or reception, corrections 
and emendations must be made in these plain texts; however, although this 
often requires skill and experience of a high order, it does not consti- 
tute another communication intelligence operation, since it is but an 
auxiliary step to the process of translation. 

f . In a large-Bcale communication intelligence effort these four 
steps7 interception, traffic analysis, cryptanalysis, and translation, 
must be properly organized and coordinated in order to gain the most bene- 
fit from the potentialities of communication intelligence, that is, the 
production of the maximum quantity of information from the raw traffic . 
This information must then be evaluated by properly trained intelligence 
specialists, collated with intelligence derived from other sources, and, 
finally, disseminated to the commanders who need the intelligence in time 
to be of operational use to them, rather than of mere historical interest. 
The foregoing operations and especially the first three— interception, 
traffic analysis, and cryptanalysis— usually complement one another. 

This, however, is not the place for elaboration on the interrelationships 
which exist and which when properly integrated make the operations as a 
whole an efficient, unified complex geared to the fulfillment of its prin- 
cipal goal, namely, the production of timely communication intelligence. 

g. With the foregoing general background, the student is prepared 

to proceed to the technical considerations and principles of cryptanalysis. 

15. The four basic operations in cryptanalysis .— a. The solution of 
practically every cryptogram involves four fundamental operations or steps: 

(1) The determination of the language employed in the plaintext 
version. 

(2) The determination of the general system of cryptography employed. 

( 3 ) The reconstruction of the specific key in the case of a cipher 
system, or the reconstruction, partial or complete, of the code book, in 
the case of a code system; or both, in the case of an enciphered code 
system. 

( 4 ) The reconstruction or establishment of the plain text. 






22 



REF ID: A5 68 95 



b . These operations will be taken up in the order in which they are 
given - * above and in which they usually are performed in the solution of 
cryptograms, although occasionally the second step may precede the first 

l6. The determination of the language employed * — a. There is not 
much that need be said with respect to this operation except that the 
determination of the language employed seldom comes into question in the 
case of studies made of the cryptograms of an organized enemy. By this 
is meant that during wartime the enemy is of course known, and it follows, 
therefore, that the language he employs in his messages will almost cer- 
tainly be his native or mother tongue . Only occasionally nowadays is 
this rule broken. Formerly it often happened, or it might have indeed 
been the general rule, that the language used in diplomatic correspondence 
was not the mother tongue, but French. In isolated instances during 
World War I the Germans used English when their own language could for 
one reason or another not be employed. For example, for a year or two 
before the entry of the United States into that war, during the time 
America was neutral and the German Government maintained its embassy in 
Washington, some of the messages exchanged between the Foreign Office in 
Berlin and the Enflbassy in Washington were encrypted in English, and a 
copy of the code used was deposited with the Department of State and our 
censor. Another instance is found in the case of certain Hindu conspira- 
tors who were associated with and partially financed by the German Govern- 
ment in 1915 and 1916 } they employed English as the language of their 
cryptographic messages . Occasionally the cryptograms of enemy agents may 
be in a language different from that of the enemy. But in general these 



1 Although the foregoing four steps represent the classical or ideal 
approach to cryptanalysis, the art may be reduced to the following: 



Procedures in crypt anal} 



1. Arrangement and rearrangement of 
data to disclose non-random cha- 
racteristics or manifestations 
(i.e., in frequency counts, re- 
petitions, patterns, symmetrical 
phenomena, etc .) . 

2. Recognition of the non -random 
characteristics or manifestations 
when disclosed. 

3. Explanation of the non-random 
characteristics when recognized. 



Requirements 



Experience or ingenuity, 
and time (which latter may 
be appreciably lowered by 
the use of machine aids in 
cryptanalysis) . 

Experience or statistics. 



Experience or Imagination, 
and intelligence. 



In all of the foregoing, the element of luck plays a very important part, 
as it is possible to side-step a large amount of labor and effort, in 
many cases, if "hunches" or intuition lead the analyst forthwith to the 
right path. Therefore, the phrase "or luck" should be added to each of 
the requirements above. 

In fact, it all boils down to the simple statement: "Find something 

significant, and attach some significance thereto." 



23 



REF ID: A5 68 95 



are, as has been said, isolated instances? as a rule, the language used 
in cryptograms exchanged between members of large organizations is the 
mother tongue of the correspondents. Where this is not the case, that is, 
when cryptograms of unknown origin must be studied, the cryptanalyst 
looks for any indications on the cryptograms themselves which may lead to 
a conclusion as to the language enployed. Address, signature, and other 
data, if in plain text in the preamble, in the body, or at the end of the 
cryptogram, all come under careful scrutiny, as well as all extraneous 
circumstances connected with the manner j.r which the cryptograms were 
obtained, the person on whom they were found, or the locale of their 
origin and destination. 

b. In special cases, or under special circumstances a clue to the 
language employed is found in the nature and composition of the crypto- 
graphic text itself. For example, if the letters K and W are entirely 
absent or appear very rarely in messages, it may indicate that the lan- 
guage is Spanish, for these letters are absent in the alphabet of that 
language and are used only to spell foreign words or names . The presence 
of accented letters or letters marked with special signs of one sort or 
another, peculiar to certain languages, will sometimes indicate the lan- 
guage used. The Japanese Morse telegraph alphabet and the Russian Morse 
telegraph alphabet contain combinations of dots and dashes which are 
peculiar to those alphabets and thus the interception of messages con- 
taining these special Morse combinations at once indicates the language 
involved. Finally, there are certain peculiarities of alphabetic lan- 
guages which, in certain types of cryptograms, viz ., pure transposition, 
give clues as to the language vised. For example, the frequent digraph CH, 
in German, leads to the presence, in cryptograms of the type mentioned, 

of many isolated C‘s and H’s; if this is noted, the cryptogram may be 
assumed to be in German. 

c. In some cases it is perfectly possible to perform certain steps 
in cryptanalysis before the language of the cryptogram has been definitely 
determined. Frequency studies, for example, may be made and analytic 
processes performed without this knowledge, and by a cryptanalyst wholly 
unfamiliar with the language even if it has been identified, or who knows 
only enough about the language to enable him to recognize valid combina- 
tions of letters, syllables, or a few common words in that language. He 
may, after this, call to his assistance a translator who may not be a 
cryptanalyst but who can materially aid in making necessary assumptions 
based upon his special knowledge of the characteristics of the language 

in question. Thus, cooperation between cryptanalyst and translator 
results in solution. 2 

2 ^ 

- The writer has seen in print statements that "during World War _I_. . . . decoded messages in Japanese 
and Russian without knowing a word of either language.” The ext \t to which such statements are exaggerated 
will soon become obvious to the student. Of course, there are occasional instances in which a mere clerk with 
xiiuite limited experience may be able to "solve” a message in an extremely simple system in a language of which 
he has no knowledge at all; but such a “solution” calls for nothing more arduous than the ability to Tccognizc 
pronounceable combinations of vowels and consonants— an ability that hardly deserves to be rated as "cr;pt- 
analytic” in any real sense. To say that it is possible to solve a cryptogram in a foreign language "without 
knowing a word of that language” is not quite the same as to say that it is possible to do so with only a slight 
knowledge of the language; and it may be stated without cavil that the better the cryptanalyst's knowledge of 
the language, tho greater are the chances for his success and, in any case, the easier is his work. 

- REDTIUCTED 24 



REF ID: A5 68 95 




RESTRICTED 

17. The determination of the general system . — a. Except in the case 
of the more simple types of cryptograms, the step referred to as diagnosis, 
that is, ascertaining the general system according to which a given cryp- 
togram has "been produced is usually a difficult, if not the most difficult, 
step in its solution. The reason for this is not hard to find. 

> b. As will become _ apparent to the student as he proceeds with his 
study7 in the final analysis, the solution of every cryptogram involving 
a form of substitution depends upon its reduction to monoalphabetic terms, 
if it is not .originally in those terms . This is true not only of ordinary 
substitution ciphers, but also of combined substitution-transposition 
ciphers, and of enciphered code. If the cryptogram must be reduced to 
monoalphabetic terms, the manner of its accomplishment is usually indi- 
cated by the cryptogram itself, by external or Internal phenomena which 
become apparent to the cryptanalyst as he studies the cryptogram. If 
this Is impossible, or too difficult, the cryptanalyst must, by one means 
or another, discover how to accomplish this reduction, by bringing to 
bear all the special or collateral information he can get from all the 
sources at his command. If both these possibilities fall him, there is 
little left but the long, tedious, and often fruitless process of elimi- 
nation. In the case of transposition ciphers of the more complex type, 
the discovery of the basic method is often simply a matter of long and 
tedious elimination of possibilities. For cryptanalysis has unfortunately 
not yet attained, and may Indeed never attain, the precision found today 
in qualitative analysis in chemistry, for example, where the analytic 
process 1 b absolutely clear-cut and exact in its dichotomy. A few words 
in explanation of what is meant may not be amiss. When a chemist seeks 
to determine the identity of an unknown substance, he applies certain 
specific reagents to the substance and in a specific sequence. The first 
reagent tells him definitely into which of two primary classes the unknown 
substance falls. He then applies a second test with another specific 
reagent, which tells him again quite definitely into which of two second- 
ary classes the unknown substance falls, and so on, until finally he has 
reduced the unknown substance to its simplest terms and has found out 
what it is. In striking contrast to this situation, cryptanalysis affords 
exceedingly few "reagents" or tests that may be applied to determine posi- 
tively that a given cipher belongs to one or the ‘ other “of two systems 
yielding externally similar results. And this is what makes the analysis 
of. an isolated, complex cryptogram so difficult. Rote the limiting adjec- 
tive "isolated" in the foregoing sentence, for it is used advisedly. It 
is not often that the general system fails to disclose itself or cannot 
be discovered by painstaking Investigation when there is a great volume 
of text accumulating from a regular traffic between numerous corre- 
spondents in a large organization. Sooner or later the system becomes 
known, either because of blunders and carelessness on the part of the 
personnel entrusted with the encrypting of the messages, or because the 
accumulation of text itself makes possible the determination of the 
general system by cryptanalytic, including statistical, studies. But in 



25 



RESTRICTED 



REF ID: A5 68 95 



the ease of a single or even a few Isolated cryptograms concerning which 
little or no information can he gained hy the cryptanalyst, he is often 
unable, without a knowledge of, or a shrewd guess as to the general system 
employed, to decompose the heterogeneous text of the cryptogram into 
homogeneous, monoalphahetic text, which is 'rhe ultimate and essential 
step in analysis . The only knowledge that the cryptanalyst can bring to 
his aid in this most difficult step is that gained hy long experience and 
practice in the analysis of many different types of systems. In this 
respect the practice of cryptanalysis is analogous to the practice of 
medicine: correct diagnosis is the most important and often the most 

difficult first step toward success. 

c. On account of the complexities surrounding this particular phase ■ 
of cryptanalysis, and because in any scheme of analysis based upon suc- 
cessive eliminations of alternatives the cryptanalyst can only progress 

as far as the extent of his own knowledge of all the possible alternatives 
will permit, it is necessary that detailed discussion of the eliminative 
process be postponed until the student has covered most of the field. 

For example, the student will perhaps want to know 1 at once how he can 
distinguish between a cryptogram that is in code or enciphered code from 
one that is in cipher. It is at this stage of his studies impracticable 
to give him any helpful indications on his question. In return it may be 
asked of him why he should expect to be able to do this in the early 
stages of his studies when often the experienced expert oryptanalyst is 
baffled on the same score! 

d. nevertheless, in lieu of more precise diagnostic tests not yet 
discovered, a general guide that may be useful in cryptanalysis will be 
built up, step by step as the student progresses, in the form of a series 
of charts comprising what may be designated An Analytical Key for Crypt- 
analysis . (See Section X.) It may be of assistance to the student if, 
as he proceeds, he will carefully study the charts and note the place 
which the particular cipher he is solving occupies in the general crypt - 
analytic panorama. These charts admittedly constitute only very brief 
outlines, and can therefore be of but little direct assistance to him 

In the analysis of the more complex types of cryptosystems he may en- 
counter later on. . So far as they go, however, they may be found to be 
quite useful in the study of elementary cryptanalysis. For the expe- 
rienced cryptanalyst they can serve only as a means of assuring that no 
possible step or process is inadvertently overlooked in attempts to solve 
a difficult cryptosystem. 

e. Much of the labor Involved In crypt analytic work, as referred 
to ln’par. 2, Is connected with this determination of the general system. 
The preparation of the text, its rewriting in different forms, sometimes 
being rewritten in dozens of ways, the recording of letters, the estab- 
lishment of frequencies of occurrences of letters, comparisons and 
experiments made with known material of similar character, and so on, 
constitute much labor that is most often indispensable, but which 



REOTRICTED 



2 6 



REF ID: A5 68 95 



RESTRICTED 

sometimes turns out to have "been wholly unnecessary, or 4n vain. In one 
treatise^ it is stated quite "boldly that "this work, once done, the deter- 
mination. of the system is often relatively easy," This statement can 
certainly apply only to the simpler types of cryptosystems j it is entirely 
misleading as regards the much more frequently encountered complex 
cryptograms of modern times. 

18, The reconstruction of the specific key .— a.- Nearly all practi- 
cal cryptographic methods require the use of a specific key to guide, 
control, or modify the various steps under the general system. Once the 
latter has "been disclosed, discovered, or has otherwise come into the _ - 
possession of the cryptanalyst, the next step in solution is to determine, 
if necessary and if possible, the specific key that was employed to en- 
crypt the message or messages tinder examination. This determination may 
not "be in complete detail; it may go~ only so ’far as to lead to a know- 
ledge of the number of alphabets involved in a substitution cipher, or 
the number of columns involved in a transposition cipher, or that a one- 
part code has been used, in the case of a code system. But It is often 
desirable to determine the specific key in as complete a form and with 

as much detail as possible, for this information will very frequently be 
useful in the solution of subsequent cryptograms exchanged between the 
same correspondents, since the nature or source of the specific key in a 
solved case may be expected to give clues to the specific key in an 
unsolved case. 

b. Frequently, however, the reconstruction of the key is not a 
prerequisite to, and does not constitute an absolutely necessary preli- 
minary step in, the fourth basic operation, viz ., the reconstruction or 
establishment of the plain text. In many cases, indeed, the two processes 
are carried along simultaneously, the one assisting the other, until in 
the final stages both have been completed in their entireties. In still 
other .cases the reconstruction of the specific key may follow the recon- 
struction of the plain 'text instead of preceding it and is accomplished 
purely a3 a matter of academic interest; or the specific key may, in 
unusual cases, never be reconstructed. 

19. The reconstruction of the plain text .— a. Little need be said 
at thifl point on this phase of cryptanalysis . The process usually con- 
sists, in the case of substitution ciphers, in 'the establishment of 
equivalency between specific letters of the cipher text and the plain 
text, letter by letter, pair by pair, and so on, depending upon the par- 
ticular type of substitution system involved. In the case of transposi- 
tion ciphers, the process consists in rearranging the elements of the 
cipher text, letter by letter, pair by pair, or occasionally word by 
word, depending upon the particular type of transposition system involved, 
until the letters or words have been returned to their original plaintext 
order. In the case of code, the process consists in determining the 
meaning of each code group and inserting this meaning in the code text to 
reestablish the original plain text. 



3 Lange et Soudart, op. cit., p. 10 6 . 



RESTRICTED 



27 



i * » 



REF ID : A56895 



REOTRICTED - 

b. The foregoing processes do not, as a rule, begin at the begin- 
ning of a message and continue letter by letter, or group by group in 
sequence up to the very end of the message. The establishment of values 
of cipher letters in substitution methods, or of the positions to which 
cipher letters should be transferred to form the plain text in the case 
of transposition methods, comes at very irregular intervals in the pro- 
cess . At first only one or two values scattered here and there through- 
out the text may appear; these then form the "skeletons" of words, upon 
which further work, by a continuation of the reconstruction process, is 
made possible; in the end the complete or nearly complete 11 ' text is 
established. 

c. In the case of cryptograms in a foreign language, the transla- 
tion of the solved messages is a final and necessary step, but is not to 
be considered as a cryptanalytic process. However, it is commonly the 
case that the translation process will be carried on simultaneously with 
the cryptanalytic, and will aid the latter, especially when there are 
lacunae which may be filled in from the context. (See also subpar. l6c 
in this connection.) 

20. The utilization of traffic intercepts . 5 — a. There are, of 
course, other operations which are not as basic in nature as those just 
outlined but which must generally be performed as preliminary steps in 
practical cryptanalytic work (as distinguished from academic cryptana- 
lysis)"! Before a military cryptanalyst can begin the analysis of an 
enemy cryptosystem, it is necessary for him to study the intercept mate- 
rial that is available to him, isolate the messages that hve been 
encrypted by means of the cryptosystem to be exploited, and to arrange 
the latter in a systematic order for analysis . This work, although 
apparently very simple, may require a great deal of time and effort. 

b. Since, whenever practicable, two or more intercept stations 
are assigned to copy traffic emanating from the stations of one enemy 
radio net, it is natural that there should be a certain amount of 
duplication in the work of the several stations. This is desirable 
since it provides the cryptanalysts with two or more sets of the same 
messages, so that when one intercept station fails to receive all the 
messages completely and correctly, because of radio difficulties, local 
static, or poor operation, it is possible by studying the other sets to 
reconstruct accurately the entire traffic of the enemy net . 

^ Sometimes in the case of code, the meaning of a small percentage 
of the code groups occurring in the traffic may be lacking, because 
there is insufficient text to establish their meaning. 

5 A traffic intercept is a copy of a communication gained through 
interception. 



RESTRICTED 



28 




REF ID: A56895 



RESTRICT ED ~ 

c. In all intct'cepfc activities vhcre operators are used for copying 
the traffic, one of the most likely errors to he found is caused by the 
human element in reception. For this reason cryptanalysts and their 




Chart 1. Most common errors in telegraphic transmission. 



assistants should be familiar with the international Morse alphabet and 
the most common errors in wire and radio transmission methods so as to be 
able to correct garbled groups when they occur. In this connection, 

Chart 1, above, will be found useful. 



C 



R ESTRICTED 



29 




REF ID: A5 68 95 




REF ID: A5 68 95 



" REGTRICTED - 



SECTION IV 

FREQUENCY DISTRIBUTIONS AND THEIR FUNDAMENTAL USES 

Paragraph 



The simple or uniliteral frequency distribution 21 

Important features of the normal uniliteral frequency 

distribution 22 

Constancy of the standard or normal unlliteral frequency 

distribution 23 

The three facts which can be determined from a study of the 

uniliteral frequency distribution for a cryptogram. ......... 24 

Determining the class to which a cipher belongs 25 

Determining whether a substitution cipher is monoalphabetic or 

non-monoalphabet ic 2 6 

The $ (phi) test for determining monoalphabeticity 2? 

Determining whether a cipher alphabet is standard (direct 

or reversed) or mixed ' 28 



21. The simple or uniliteral frequency distribution . — «• It has 
long been known to cryptographers and typographers +*>at the” letters com- 
posing the words of any intelligible written text composed in any language 
which is alphabetic in construction are employed with greatly varying 
frequencies. For example, if on cross-section paper a simple tabulation, 
shown in Fig. 1, called a unlliteral frequency distribution , is made of 
the letters composing the words of the preceding sentence, the variation 
in frequency is strikingly demonstrated. It is seen that whereas certain 
letters, such as A, E, I, N, 0, R, and T, are employed very frequently, 
other letters, such as C, G, H, L, P, and S are employed not nearly so 
frequently, while still other letters, such as F, J, K, Q, V, X, and Z 
are employed either seldom or not at all. 



* g 




. 3^ 

ABCDEFGHIJKLMNOPQRSTUVWXYZ 



14 3 8 4 22 2 9 10 15 0 1 9 3 17 14 8 1 13 10 20 3 J 0 1 7 0 

(Total=200 letters) 

Figure 1. 

h. If a similar tabulation .is now made of the letters comprising the 
words of the second sentence In the preceding subparagraph, the distribu- 
tion shown in Fig. 2 is obtained. Both sentences have exactly the same 
number of letters (200) . 



31 



RESTRICTED 



REF ID: A 5 68 95 



g 5%?^ g § II. gll 
Iglllllll >I|III= 5 |||?.^S 

ABCDEFGHIJKLMNOPQRSTUVWXYZ 

12 2 8 7267 4 6200 1 9 5 17 14 0 2 13 14 17 0 1 3 1 3 0 

(Total=200 letter*} 

Figure 2 . 



c. Although each of these two distributions exhibits great varia- 
tion In the relative frequencies with which different letters are employed 
in the respective sentences to’ which they apply, no marked differences 
are exhibited between the frequencies of the same letter in the two dis- 
tributions* Compare, for example, the frequencies of A, B, C • • • Z in 
Fig. 1 with those of A, B, C . . . Z in Fig. 2 . Aside from one or two 
exceptions, as in the case of the letter F, these two distributions agree 

rather strikingly. 

•> 

d. This agreement, or similarity , would be practically complete if 
the two texts were much longer, for example, five times as long. In fact, 
when two texts of similar character, each containing more than 1,000 let- 
ters, are compared, it would be found that the respective frequencies of 
the 26 letters composing the two distributions show only very slight dlf- • 
ferences. This means, in other words, that in normal plain text each 
letter of the alphabet occurs with a rather constant or characteristic 
frequency which it tends to approximate, depending upon the length of the 
text analyzed. The longer the text (within certain limits), the closer 
will be the approximation to the characteristic frequencies of letters 

in the language involved. However, when the amount of text being ana- 
lyzed has reached a substantial volume (roughly, 1,000 letters), the prac- 
tical gain in accuracy does not warrant further increase in the amount 
of texb.- 1 - 



e. An experiment along these lines will be convincing. A series 
of 265 official telegrams 2 passing through the Department of the Army 
Message Center was examined statistically.' The messages were divided 
into five sets, each totaling 10,000 letters, and the five distributions 
shown in Table 1 -A, were obtained. 



1 See footnote 5 , page 38. 

2 These comprised messages from several official sources in addition 
to the Department of the Army and were all of an administrative character. 



•nTrmrnmnriTnn 




3 2 



REF ID : A56895 



Table 1-A. — Absolute frequencies of letters appearing in five sets of Governmental plain-text 
each set containing 10,000 letters, arranged alphabetically 




Absolute 

Frequency 



738 

104 

819 

887 

1,367 

253 

166 

310 

742 

18 

36 

365 

242 

786 

685 

241 

40 

760 

658 

936 

270 

163 

166 

43 

191 

14 



TotaL 10,000 




Absolute 

Frequency 



788 

103 

800 

413 

1,294 

287 

176 

351 

750 

17 

38 

393 

240 

794 

770 

272 

22 

746 

583 

879 

233 

173 

163 

60 

155 

17 



10,000 




Absolute 

Frequency 




Absolute 

Frequency 



740 

83 

826 

451 

1,270 

287 

167 

3‘49 

700 

21 

21 

386 

249 

800 

756 

245 

38 

785 

628 

958 

247 

183 

183 

58 

213 

11 



10,000 



Absolute 

Frequency 



f . If the five distributions in Table 1-A are summed, the results 
are as shown in Table 2-A« - .... \ 



Table 2-A. — Absolute frequencies 



ides of letters appearing in the combined five sets of messages totaling 
60,000 letters, arranged alphabetically 



A... . 


3, 683 


6 


819 


L. 


1 ,821 


0- — 


175 


V. 


766 


B. 


487 


H 


1,694 


M. 


1 ,237 


R. 


3, 788 


w. 


780 


C 


1,534 


I„... 


3,676 


N„ .. 


3 ,975 


S. 


3, 058 


X. 


231 


D. 


2, 122 


J._. 


82 


0 


3 ,764 


T. 


4,595 


y. 


967 


E. .. . 

F. 


6,498 

1,416 


K 


248 


P. 


1 ,335 


U. 


1,300 

- - 1 


z. 


49 



33 






















REF ID: A5 68 95 



g. The frequencies noted in Table 2-A above, when reduced to the 
basis of 1,000 letters and then used as a basis for constructing a simple 
chart that will exhibit the variations in frequency in a striking manner, 
yield the following distribution which is hereafter designated as the 
normal or standard uniliteral frequency distribution for English 
telegraphic plain text: 



ABC 



g g g 

D E F 



74 10 31 43 130 28 



g g g g 

g g g g 

g g g g 

g - g g g 
g g g g 

g g g g 

g g g g g g 

gg gggg _ § 

gg gggggg Ig 

gg gggggg g 

ggssgggggggg-. 

OPflRSTUVWXtZ 

75 37 3 78 01 02 20 14 10 S IS 1 



Figure 3. 



22. Important features of the normal uniliteral frequency distri - 
bution .'— a. When the distribution shown in Fig. 3 is studied in detail, 
the following features are apparent: 

(1) It is quite irregular in appearance. This is because the letters 
are used with greatly varying frequencies, as discussed in the preceding 
paragraph. This irregular appearance is often described by saying that 
the distribution shows marked crests and troughs , that is, points of high 
frequency and low frequency. 

(2) The relative positions in which the crests and troughs fall 
within the distribution, that is, the spatial relations of the crests and 
troughs, are rather definitely fixed and are determined by circumstances 
which have been explained in subpar. 13 b. 

(3) The relative heights and depths of the crests and troughs within 
the distribution, that is, the linear extensions of the lines marking the 
respective frequencies, sre also rather definitely fixed, as would be 
found if an equal volume of similar text were analyzed. 



34 



REF ID: A5 68 95 



RESTRICTED 

00 The most prominent crests are marked by the vowels A, E, I, 0, 
and. the consonants N, R, S, Tj the most prominent troughs are marked by 
the consonants .J, K, Q, X, and Z. 

(5) The important data are summarized in tabular form in Table 3* 

- ' T _ « 

Table 3 



1 ^ _ _ 
l 


Frequency 


Percent of 
total 


Percent of 
total in 
round 
numbers 


6 Vowels: A E X 0 U Y.‘ .1 


398 


39.8 


40 


20 Conson&nts: 








5 High Frequency (D HRS T) 


350 


35.0 


35 


10 Medium Frequency (BCFGHLMPV W) 


238 


23.8 


24 


5 Low Frequency ( J K Q X Z) 


14 


1.4 

! 


1 


Total . . -- . _ „ _ _ - _ 


1,000 


100. 0 


100 












(6) The frequencies of the letters of the alphabet, reduced to a 



"base of 


1000, are 


as 


follows: ■ 












A. .. 


74 


G 


Ifi 


T. 


36 Q-. 


3 


v„ 


Ifi 


B 


„ 10 


H_„. 


34. 


M 


25 R.. 


7fi 


ff- 


16 


c 


31 


I_ 


74 


to 


79 S„ 


fil 


X. 


fi 


D 


42 


J__ 


2 


0 


75 T.. 


_ Q2 


Y_ 


IQ 


E. .. 


130 


K 


3 


p 


27 U-. 


2fi 




1 


F 


28 
















(7) 


The relative 


order of 


frequency of the 


letters Is 


as 


follows : 


' E 


. . 130 


i_ 


74 


C._ 


31 Y. 


19 


X.. 


k 


T 


92 


s... 


61 


F 


28 G. 


" ' 1 ft 




3 


N 


79 


D... 


42 


R 


27 W. 


_ _____ ifi 


K,. 


3 


R 


76 


L„. 


36 


U 


26 V. 


15 


J.. 


2 


0 


75 


H_„ 


34 


n 


25 B. 


10 


ZL 


1 



A 74 

(8) The four vowels A, E, I, 0 (combined frequency 353) and the foul* 
consonants N, R, S, T (combined frequency 308) form 66l out of every 
1,000 letters of plain text; in other words, less than one-third of the 
alphabet is employed in writing two-thirds of normal plain text. 














d. As a matter of fact, other tables compiled from Army sources 
gave Slightly different results, depending upon the source of the text. 
For example, three tables based upon 75,000, 100,000, and 136,257 letters 
taken from various sources (telegrams, newspapers, magazine articles, 
books of fiction) gave as the relative order of frequency for the first 
10 letters the following: 

For 75,000 letters ETRNIOASDL 

For 100,000 letters ETRIUOASDL 

For 136,257 letters ETRNAOISLD 



3 Just as the individual letters constituting a large volume of plain 
text have more or less characteristic or fixed frequencies, so it is 
found that d igraphs and trigraphs (two- and three -letter combinations, 
respectively)" have characteristic frequencies, when a large volume of 
text is studied statistically. In Table 6 of Appendix 2, "Letter fre- 
quency data - English", are shercm the relative frequencies of all digraphs 
appearing in the 260 telegrams referred to in subpar. 21e. This appendix 
also includes several other kinds of tables and lists of frequency data 
which ■trill be useful to the student in his work. It is suggested that 
the student refer to this appendix now, to gain an idea of the data 
available for his future reference. 

Other languages, of course, each have their own individual charac- 
teristic plaintext frequencies of single letters, digraphs, trigraphs, 
etc . A brief su'iutiary of the letter frequency data for German, French, 

I-: 'Vilen, Spanish, Portuguese, and Russian constitute Appendix 5, "Letter 
f* jqucncy data - foreign languages". 



RESTRICTED REF ID : A56895 

• 1 ^ 

N 

b. The data given in Fig. 3 and Table 3 represent the relati^ fre- 
quencies found in a large volume of English telegraphic text of a govern- 
mental, administrative character .3 These frequencies will vary somewhat 
with the nature of the text analyzed. - For' example, if an equal number 

of telegrams dealing solely with commercial transactions in the leather 
industry were studied statistically, the frequencies would be slightly 
different because of the repeated occurrence of words peculiar to that 
industry. Again, if an equal number of telegrams dealing solely with 
military messages of a tactical character were studied statistically, 
the frequencies would differ slightly from those found above for geberal 
governmental messages of .an administrative character. f 

t . 

c . If ordinary English literary text (such as may be found in any 
book, "newspaper, or printed document) were analyzed, the frequencies of 
certain letters would be changed to an appreciable degree. This is 
because in telegraphic text words which are not strictly essential for 
intelligibility (such as the definite and indefinite articles, certain 
prepositions, conjunctions , and pronouns) are omitted. In addition, 
certain essential words, such as "stop", "period", "comma", and the like, 
which are usually indicated in written or printed matter by symbols not 
easy to transmit telegraphically and which must, therefore, be spelled 
out in telegrams, occur very frequently. Furthermore , telegraphic text 
often employs longer and more uncommon words than does ordinary newspaper 
or hook texb. 



36 



RESTRICTED 



REF ID: A5 68 95 



e. Frequency data applicable purely to English military text were 
compiled by Hitt/ 1- from a study of 10,000 letters taken from orders and 
reports. The frequencies found by him are given in Tables k and 5. 



Table 4. — Frequency table jor 10,000 letters of literary English, as compiled by Hitt 

ALPHABETICALLY ARRANGED 



A. 


778 


G... 


174 


L. 


372 


q * 


vl. 


112 


B. 


141 


H__. 


595 


M 


288 


R 651 


w. 


176 


C. ... 


296 


I... 


667 


N 


686 


S. 622 


X 


27 


D. 


402 


J._ 


51 


0. 


807 


T. 855 


Y„ 


196 


E. 


1 ,277 


K... 


74 


P. 


223 


u ana 


z. 


17 


F. 


197 




















ARRANGED 


ACCORDING TO 


FREQUENCY 






E 


l ,277 


R... 


651 


11 


308 


Y 196 


K 


74 


T. 


855 


S... 


622 


c 


296 


W . 176 


J 


51 


0 


807 


H__ 


595 


M ... 


288 


G. 174 


X. 


27 


A 


778 


D... 


402 


P. 


223 


B ...... 141 


z. 


17 


N. 


686 


L... 


372 


F. 


197 


V. 112 


Q. 


8 


I 


667 

















Table 5. — Frequency table jor 10,000 letters of telegraphic English, as compiled by Hitt 



ALPHABETICALLY ARRANGED 



A 


813 


G.. 


201 


L. 


... 392 


Q. 


38 


V. 


136 


B 


149 


H._ 


38fi 


M 


... 273 


R 


G77 


ff 


166 


c 


306 


I.. 


711 


N 


... 718 


s 


656 


X. 


51 


D. 


417 


J-. 


42 


0 


... 844 


T 


634 


Y 


208 


E...... 


1 ,319 


K.. 


88 


P. 


... 243 


u 


321 


z. 


6 


F 


205 
























ARRANGED 


ACCORDING TO 


FREQUENCY 






E 


1 ,319 


S_. 


656 


U. 


... 321 


F. 


205 


K_ 


88 


0 


844 


T._ 


634 


C___. . 


... 306 


G 


201 


X. 


51 


A. 


813 


D.. 


417 


M 


... 273 


w. 


166 


J 


42 


N. 


718 


L.. 


392 


P. 


... 243 


B 


149 


Q. 


38 


I. 


711 


HL. 


386 


Y. 


... 208 


V. 


136 


Z. 


6 


R. 


677 



















23. Constancy of the standard or normal uniliteral frequency dis - 
tribution . — a. The relative frequencies disclosed by the statistical 
study of large volumes of text may be considered to be the standard or 
normal frequencies of the letters of written English. Counts made, of 
smaller volumes of text will Lend to approximate these normal frequencies, 

1 0 p» cit ., pp. 6 - 7 . 






RESTRICTED 



37 



REF ID: A5 68 95 




REOTRICTEB - 



A 



and, vitliin certain limits, 5 the smaller the volume, the lower wilifbe 
the degree of approximation to the normal, until, in the case of a ’• fery 
short message, the normal proportions may not manifest themselves a-; all. 
It is advisable that the student fix this fact firmly in mind, for ; ;he 
sooner he realizes the true nature of any data relative to the frequency 
of occurrence of letters in text, the less often will his labors toward 
the solution of specific ciphers be thwarted and retarded by too strict 
an adherence to these generalized principles of frequency. He should 
constantly bear in mind that such data are merely statistical generaliza- 
tions , that they will be found to hold strictly true only in large Volumes 
of text, and that they may not pven be approximated in short messages. 



b. Nevertheless the normal frequency distribution or the "normal 
expectation" for any alphabetic language is, in the last analysis, the 
best guide to, and the usual basis for, the solution of cryptograms of a 
certain type. It is useful, therefore, to reduce the normal, uniliteral 
frequency distribution to a basis that more or less closely approximates 
the volume of text which the cryptanalyst most often encounters in indi- 
vidual cryptograms. As regards length of messages, counting only the 
letters in the body, and excluding address ahd signature, a study of 
the 260 telegrams referred to in par. 21 shows that the arithmetical 
average is 217 letters; the statistical mean, or weighted average®, 
however, is 191 letters. These two results are, however, close enough 
together to warrant the statement that the average length of telegrams is 
approximately 200 letters. The frequencies given in par. 21 have there- 
fore been reduced to a basis of 200 letters, and the following unilite- 
ral frequency distribution may be taken as showing the most typical 
distribution to be expected in 200 letters of English telegraphic text: 



. 

g - ^ 

g g g I g g 5 = 3 

g =* g is g g ggg 

g g g g g S: g g 

ABCDEFGHIJKLMfcOPQRSTUVWXYZ 



Figure 4. 



?It is useless to go beyond a certain limit in establishing the nofmal-frequency distribution for & given 

language. As a striking instance of this fact, witness the frequenoy study made by an indefatigable German, 
Kacding, who in 1898 made a count Of the letters in about 11,0(10,000' words, totaling about 62,000,000 tetters in 
German text. When reduced to a percentage basis, and when the relative order of frequency was determined, 
the results he obtained differed very little from the results obtained by Kasiairi, a German cryptographer, from a 
count of only 1,000 letters. See Kaeding, Itdeufigkeilsiooet-lerbuch, Steglitz, 1898; jfcaslsld, I)ie Qeheimschriften 
und die Dechijfrir-Kunst, Berlin, 1863. 

/ I 

0 The arithmetical average is obtained by adding each different length 
and dividing by the number of different -length messages; the mean is ob- 
tained by multiplying each different length by the number of messages of 
that length, adding all products , ahd dividing hy the tptal number of 
messages . 




38 



REF ID : A56895 

RESTRICTED 

c. The student should take careful note of the appearance of the 
distribution? shown in Fig. *1, for it will he of much assistance to him 
in the early stages of his study. The manner of setting down the tallies 
should he followed hy him in making his own distributions, indicating 
every fifth occurrence of a letter hy an oblique tally. This procedure 
almost automatically shows the total number of occurrences for each let- 
ter, and yet does not destroy the graphical appearance of the distribu- 
tion, especially if care is taken to use approximately the same amount 

of space for each set of five tallies. Cross-section paper is very 
useful for this purpose. 

d, The word "uniliteral" in the designation "uniliteral frequency 
distribution" means "single letter", and it is to he inferred that other 
types of frequency distributions may he encountered. For example, a 
distribution of pairs of letters , constituting a hiliteral frequency 
distribution, is very often used in the study of certain cryptograms in 
which it is desired that pairs made hy combining successive letters he 
listed. A hiliteral distribution of A B C D E F would take these pairs: 
AB, BC, CD, DE, EF. The distribution could he made in the form of a 
large square divided up into 676 cells . When distributions beyond hi- 
literal are required (triliteral, quadriliteral, etc.) they can only he 
made hy listing them in some order, for example, alphabetically based on 
the 1st, 2d, 3d, . . . letter. 



? The use of the terms "distribution" and "frequency distribution", 
instead of "table" and "frequency table", respectively, is considered 
advisable from the point of view of consistency with the usual statistical 
nomenclature. When data are given in tabular form, with frequencies 
indicated hy numbers , then they may properly he said to he set out in 
the form of a table . When, however, the same data are distributed in a 
chart which partakes of the nature of a graph, with the data indicated 
hy horizontal or vertical linear extensions, or hy a curve connecting 
points corresponding to quantities, then it is more proper to call such 
a graphic representation of the data a distribution . 




J.VUU JL X JUI^ * -c 

i 

24. The three facts wMefa can 'be determined from a study of the 
unllitoral frcqiiency distribution for a cryptogram . -"-a. The following 
three facts (to he explained subsequently) can usually he determined from 
an inspection of the uniliteral frequency distribution for a given cipher 
message of average length, composed of letters: 

(1) Whether the cipher belongs to the substitution or the transpo- 
sition class; 4 

(2) If to the former, whether it ir monoalphabetic® or non- 
monoalphabet ic 9 in character; 

•i 

(3) If monoalphabet ic, whether the cipher alphabet is standard 

(direct or reversed) or mixed. * 

b. For immediate purposes the first two of the foregoing determi- 
nations are quite important and will be discussed in detail in the next 
two paragraphs ; the other determination will be touched upon very briefly, 
leaving its detailed discussion for subsequent sections of the text# 

2$, Determining the class to which a cipher belong s,— a# The deter- 
mination of the class to which a cipher belongs is usually a relatively 
easy matter because of the fundamental difference between transposition 
and substitution as cryptographic processes# In a transposition cipher 
the original letters of the plain text have merely been rearranged, 
vithout any change whatsoever in their identities, that is, in the 
conventional values they have in the normal alphabet. Hence, the nurfbers 
of vowels (A, E, I, 0, U, Y), high-frequency consonants (D, N, R, S, T), 
me&iun-f re queney consonants (B, C, F, G, H, L, M, P, V, W), and low- 
frcquency consonants (J, K, Q, X, Z) are exactly the same in the 
cryptogram as they are in the plaintext message. Therefore, the 
percentages of vowels, high-, medium-, and low-frequency consonants are 
the some in the transposed text as in the equivalent plain text. In a 

& In connection with uniliteral frequency distributions, the term 
mono alphabetic is considered to embrace the concept of monoalphabetic- 
monographic -uniliteral systems only, thus excluding polygraphic and 
multilitoral systems, both of which, however, usually fall into the 
mouoalphabetic category. 

9 The term non-monoalphabetic as applied in this instance IS consi- 
dered to embrace all deviations from the characteristic appearance of 
monoalphabetic distributions* These deviations include the phenomena 
inherent in polyalphabetic, polygraphic, and multiliteral cryptograms, 
as well as in random text, i.c., text which appears to have been pro- 
duced by chance or accident, having no discernible patterns or 
limitations . 





nEOTRICTE fr 



REF ID: A5 68 95 



substitution cipher, on the other hand, tho identities of the original 
.letters of the plsin_ text have hcen •changed, that is, the conventional 
values they have in tli'e’ normal alphabet have been altered. Consequently, 
if a count is made of the various letters present "in such a cryptogram, 
it will he found that tho number of vowels, high-, medium-, and low- 
frequency consonants will usually he quite different in tho cryptogram 
from what they are in the original plaintext message. Therefore, the 
percentages of vowels, high-’, medium-, and low-fr'e quency consonants are 
usually quite different in the substitution text from what they ere in 
the equivalent plain text. Prom these considerations it .follows that if 
in a specific cryptogram the percentages of vowels, high-, medium-, and 
low-frequcncy consonants are approximately the same as vould be expected 
in normal plain text, the cryptogram probably belongs to the transposition 
class; if these percentages are quite different from those to be expected 
in normal plain text the cryptogram probably belongs to the substitution 
class . 

b. In the preceding subparagraph the word ’'probably was emphasized 
by italicizing it, for there can be no certainty in every case of this 
determination. Usually these percentages in a transposition cipher are 
close to the normal percentages for plain text; usually , in a substitu- 
tion cipher, they are far different from the normal percentages for plain 
text. But occasionally a cipher message is encountered which is difficult 
to classify with a reasonable degree of certainty because the message is 
too short for the general principles of frequency to manifest themselves. 
It is clear that if in actual messages there were no variation whatever 
from the normal vowel and consonant percentages given in Table 3, the 
aexerraination of the class to which a specific cryptogram belongs would 
be an extremely simple matter. But unfortunately there is always some 
variation or deviation from the normal.. Intuition suggests that as 
messages decrease in length there may be a greater and greater departure 
from the normal proportions of vowels , high-, medium-, and low-frequency 
consonants, until in very short messages the normal proportions may not 
hold at all. Similarly, as messages increase in length there may be a 
lesser and lesser departure from the normal proportions, until in messages 
totalling a thousand or more letters there may be no difference at all 
between the actual and the theoretical proportions. But Intuition is not 
enough, for in dealing vith specific messages of the length of those 
commonly encountered in practical work the question sometimes arises as 
to exactly hour much deviation (from the normal proportions) may be allowed 
for in a cryptogram which shows a considerable amount of deviation from 
the normal and which might still belong to the transposition rather than 
to the substitution class. 

£. Statistical studies have been made on this matter and some graphs 
have been constructed thereon. These are shewn in Charts 2 - 5 in the 
form of simple curves, the use of which will now be explained. Each 
chart contains two curves marking the lower and upper limits, respect- 
ively, of the theoretical amount of deviation (from the normal percent - 
) of vowels or consonants which may be allowable in a cipher believed 
to belong to the transposition class. 



la' 



nEDTRICTBfr 



RESTRICTE D- ' REF ID : A568 95 

d. In Chart 2, curve V]_ marks the lower limit of the theoretical 
amount of deviation 1 *-* from the number of vowels theoretically expected to 
appear 11 in a message of given length} curve Vg marks the upper limit 

of the same statistic. Thus, for example, in a message of 100 letters 
in plain English there should he between 33 and 47 vowels (A E I 0 U Y) • 
Likewise, in Chart 3 curves Hq and H2 mark the lower and upper limits as 
regards the high-frequency consonants. In a message of 100 letters jthere 
should he between 28 and 42 high-frequency consonants (DURST), .In 
Chart 4 curves Mi and M2 mark the lower and upper limits as regards ithe 
medium-frequency consonants . In a message of 100 letters there should he 
between 17 and 31 medium- frequency, consonants (BCFGHLMPVW). 
Finally, in Chart 5# curves Li and L2 mark the lower and upper limits as 
regards the low-frequency consonants . In a message of 100 letters there 
should he between 0 and 3 low-frequency consonants (J K Q X J5) « In using 
the charts, therefore, one finds the point of intersection of the vertical 
coordinate corresponding to the length of the message, with the horizontal 
coordinate corresponding to (l) the number of vowels, (2) the number 
of high-frequency consonants, (3) the number of medium-frequency con- 
sonants, and* (4) the number of low-frequency consonants actually counted 
in the message. If all four points of intersection fall within the 
area delimited by the respective curves, then the numbers of vowels and 
high-, medium-, and low-frequency consonants correspond with the numbers 
theoretically expected iii a 'normal plaintext message of the same length} 
since the message under investigation is not plain text, it follows that 
the cryptogram may certainly be classified as a transposition aipher. On 
the other hand, if one or more of these points of intersection fall out- 
side the area delimited by the respective curves, it follows that the 
cryptogram Is probably a substitution cipher. The distance that the point 
of intersection falls outside the area delimited by these curves is a more 
or less rough measure of the improbability of the cryptogram's being a 
transposition cipher. 

e. Sometimes a cryptogram is encountered which is hard to classify 
with "certainty even with the foregoing aids, because it has been con- 
sciously prepared with a view to making the classification difficult. 

This can be done either by selecting peculiar words (as in “trick crypto- 
grams") or by employing a cipher alphabet in which letters of approx - 
imately similar normal frequencies have been interchanged. For example, 

E may be replaced by 0, T by R, and so on, thus yielding a cryptogram 
giving external indications of being a transposition cipher but which is 
really a substitution cipher. If the cryptogram is not too short, a close 
study -trill usually disclose what has been done, as well as the futility of 
so simple a subterfuge , 



10 In Charts 2-5, inclusive, the limits of the upper and lower curves 
have been calculated to include approximately 70 percent of messages of 
the various lengths. 

11 The expression “the number of ... theoretically expected to appear" 
is often condensed to "the theoretical expectation of ..." or "the normal 
expectation of 





10 20 30 40 £0 60 70 80 90 100 1 10 120 130 140 150 160 170 180 190 200 

Number of letters in mossago. 

Chart 2. Curves marking the lower and upper limits of 
the theoretical amount of deviation from the number of vowels 
theoretically expected in messages of various lengths. 

(See subpax. 25d.) 



tion ciphers. In the former case, his eyes very speedily note many high- 
frequency letters, such as E, T, N, R, 0, and S, with the absence of 
loir-frequency letters, such as J, K, Q, X, and Z; in the latter case, his 
eyes just as quickly note the presence of many low-frequency letters, and 
a corresponding absence of some of the high-frequency letters . 



I 



43 






REF ID : A56895 



£. Another rather quickly completed test, in the case of the simpler 
varieties of ciphers, is to look for repetitions of groups of letters * As 
will become apparent very soon, recurrences of syllables, entire wbrds and 
short phrases constitute a characteristic of all normal plain text!. Since 
a transposition cipher involves a change i r the sequence of the letters 



■■■■■■■■■■■■■■■I 



siii 



10 20 30 40 50 60 70 80 90 1 



IfO 120 I 



160 170 I 



Number of letters in message. 



Chart 3* Curves marking the lower and upper limits of 
the theoretical amount of deviation from the nuniber of high- 
frequency consonants theoretically expected in messages of 
various lengths. (See subpar . 25d.) 



composing a plaintext message, such recurrences are broken up so that 
the cipher text no longer will show repetitions of more or less lengthy 
sequences of letters. But if a cipher message does show many repetitions 
and these are of several letters in length, say over four or five, the 



REF ID : A56895 



RE S TRICTED 

conclusion is at once warranted that the cryptogram Is most probably a 
substitution and not a tranposition cipher. However, for the beginner 
in cryptanalysis, it will be advisable to make the uniliteral frequency 
distribution, and note the frequencies of the vowels and of the high-, 




Number of letters in message. 

Chart 4. Curves marking the lower and upper limits of 
the theoretical amount of deviation from the number of medium- 
frequency consonants theoretically expected in messages of 
various lengths. (See subpar. 25d.) 



t 

medium-, and low-frequency consonants. Then, referring to Charts 2 to 5, 
he should carefully note whether or not the observed frequencies for these 
categories of letters fall within the limits of the theoretical frequen- 
cies for a normal plaintext message of the same length, and be guided 
accordingly. 



45 



REF ID : A56895 



- II 

h. It is obvious that the foregoing rule applies only to ciders 
composted wholly of lettei's . If a message is composed entirely of! figures, 
or of arbitrary signs and symbols, or of intermixtures of letters j • figures 
and other symbols, it is immediately apparent that the cryptogram -is a 
substitution cipher. -j 




Number of Iottors in mossago. 



Chart 5 • Curves marking the lower and upper limits of 
the theoretical amount of deviation from the nuaiber of low- 
frequency consonants theoretically expected in messages of 
various lengths. (See subpar. 25d„) 



jL. Finally, It should be mentioned that there are certain kipds of 
cryptograms whose class cannot be determined by the method set forth Jr 
subparagraph d above . These exceptions will be discussed in a subsequent 
section of this text.^ 



12 Section X. 



1)6 




REF ID: A5 68 95 



REOTRICTE& 



2 6 . Determining whether a substitution cipher 1b monoalphabetlc or 
non-roonoalphabetic . — a . It will be remembered that a monoalphabetlc 
substitution cipher is one in which a single cipher alphabet is employed 
throughout the whole message; that is, a given plaintext letter is in- 
variably represented throughout the message by one and the same letter in 
the cipher text* On the other hand, a polyalphabetic substitution cipher 
is one in which two or more cipher alphabets are employed within the same 
message; that is, a given plaintext letter may be represented by two or 
more different letters in the cipher text, according to some rule govern- 
ing the selection of the equivalent to be used In each case. From this 
it follows that a single cipher letter may represent two or more different 
plaintext letters. A similar situation prevails in the case of multi - 
literal substitution, in which a particular cipher letter may constitute 
a part of 'the equivalents for several plaintext letters, giving rise to 
phenomena resembling those of polyalphabeticity. 

b. It is easy to see why and how the appearance of the uniliteral 

frequency distribution for a substitution cipher may be used to determine 
whether the cryptogram is monoalphabetlc or non-monoalphabetic in char- 
acter. The normal distribution presents marked crests and troughs by 
virtue of two circumstances. First, the elementary sounds which the 
symbols represent are used with greatly varying frequencies, it being one 
of the striking characteristics of every alphabetic language that its 
elementary sounds are used with greatly varying frequencies .33 In the 
second place, except for orthographic aberrations peculiar to certain 
languages (conspicuously, English and French) , each such sound Is rep- 
resented by the same symbol. It follows, therefore, chat since in a 
monoalphabetlc substitution cipher each different plaintext letter 
(selementary sound) is represented by one and only one cipher letter 
(^elementary symbol), the uniliteral frequency distribution for such a 
cipher message must also exhibit the irregular crest-and-trough appearance 
of the normal distribution, but with this important modification — the 
absolute positions of the crests and troughs will not be the same as In 
the normal . That is, the letters accompanying the crests and the troughs 
in the distribution for the cryptogram will be different from those accom- 
panying the crests and the troughs in the normal distribution. But the 
marked irregularity or "roughness" of the distribution, that is, the 
presence of accentuated crests and troughs, is in itself an indication 
that each symbol or cipher letter always represents the same plaintext 
letter in that cryptogram. Hence the general rule: A marked crest-and - 

trough appearance in the unillteral frequency distribution for a given 
cryptogram indicates that a single cipher alphabet is involved and 
constitutes one of the tests for a monoalphabetlc substitution cipher . 

c. On the other hand, suppose that in a cryptogram each cipher 
letter represents several different plaintext letters. Some of them are 
of high frequency, others of low frequency. The net result of such a 



3-3 The student who is interested in this phase of the subject may find 
the following reference of value: Zipf G.K., Selected Studies of the 

Principle of Relative Frequency in Language , Cambridge, Mass . , 1932. 



! 



47 






situation, so far as the uniliteral frequency distribution for th^ ( 
cryptogram is concerned, is to prevent the appearance of any markejl 
crests and troughs and to tend to reduce the elements of the distribution 
to a more or less common level. This imparts a "flattened out" appear- 
ance to the distribution. For example, in a certain cryptogram of’ 
polyalphabetic construction, K c =E p , Cm, and J p ; RcsAp, Dp, and B p jl 
Xc=Op, Lp, and F p . The frequencies of Kc, R c , and X c will be approx- 
imately equal because the summations of the frequencies of the several 
plaintext letters each of these cipher letters represents at different 
times will be about equal. If this same phenomenon were true of all the 
letters of the cryptogram, it is clear that the frequencies of th^ 2 6 
letters , when shown by means of the ordinary uniliteral frequency dist- 
ribution, would shew no striking differences and the distribution would 
have the flat appearance of a typical polyalphabetic substitution cipher. 
Hence, the general rules The absence of marked crests and troughs in the 
unlliteral frequency distribution indicates that a c 



itution is involved. The flattened-out appearance of the distribution 



then, is one of the criteria for the rejection of a hypothesis of mono 



alphabetic^ substitution . 

d. The foregoing test based upon the appearance of the frequency 
distribution is only one of several means of determing whether a sub- 
stitution cipher is monoalphabetlc o.' non-monoalphabetic in composition. 
It can be employed in cases yielding frequency distributions from which 
definite conclusions can be drawn with more or less certainty by mere 
ocular examination. In those cases in which the frequency distributions 
contain insufficient data to permit drawing definite conclusions by such 
examination, certain statistical tests can be applied. One of these 
tests, called the <f> (phi) test, warrants detailed treatment and is 
discussed in paragraph 27 below. 

e* At this point, however, one additional test will be given be- 
cause of its simplicity of application. This tesl, the A (lambda) or 
blank-expectation test , may be employed in testing messages up to 200 
letters in length, it being assumed that in messages of greater length 
ocular examination of the frequency distribution offers little or no 
difficulty. This test concerns the number of blanks in the frequency 
distribution, that is, the number of letters of the alphabet which are 
entirely absent from the message. It has been found from statistical 
studies that rather definite "laws" govern the theoretically expected 
number of blanks in normal plaintext messages and in frequency distribu- 
tions for cryptograms of different natures and of various sizes . The 
results of certain of these studies have been embodied in Chart 6. 

ft This chart contains two curves . The one' labeled F applies to the 
average number of blanks theoretically expected in frequency distributions 
based upon normal plaintext messages of the indicated lengths. The other 
curve, labeled R, applies to the average number of blanks theoretically 
expected in frequency distributions based upon perfectly random assort- 
ments of letters; that is, assortments such as would be found by random 



Cf., footnote 8 on page 40. 



US 




REF ID: A5 68 95 



RESTRICTED 

selection of letters out of a hat containing thousands of letters, all of 
the 2 6 letters of the alphabet being present in equal proportions, each 
letter being replaced after a record of its selection has been made. Such 
random assortments correspond to polyalphabetic cipher messages in which 
the number of cipher alphabets is so large that if unilateral frequency 
distributions are made of the letters, the distributions are practically 
identical with those vhich are obtained by random selections of letters 
cut of a hat. 




Chart 6. Curves showing the average number of blanks 
theoretically expected in distributions for plain text (P) 
and for random text (R) for messages of various lengths. 
(See subpar . 26f.) 



. g. In using this chart, one finds the point of intersection of the 
vertical coordinate corresponding to the length of the message, with the 
horizontal coordinate corresponding to the observed number of blanks in 
the distribution for the message. If this point of intersection falls 
closer to curve P than it does to curve R, the number of blanks in the 
message approximates or corresponds more” closely to the number theoreti- 
cally expected in a plaintext message than it does to a random (ciphertext) 
message of the same length; therefore, this is evidence that the crypto- 
- gram is monoalphabet ic . Conversely, if this point of intersection falls 



RESTRICTBB - 



1*9 



RESTRICTED 



REF ID: A5 68 95 



closer to curve R than to curve P, the number of blanks in the message ap- 
proximates or corresponds more closely to the number theoretically expected 
in a random text than it does to a plaintext message of the same length; 
therefore, this is evidence that the cryptogram is non-monoalphabet ic • 

I 

27 . The j> (phi) test for determining monoalphabet ic lty « — a « 'i?he 
student has seen in the preceding paragraph how it is possible” to deter- 
mine by ocular examination whether or not a substitution cipher is i mono- 
alphabetic. This tentative determination is based on the presence of a 
marked crest-and-trough appearance in the unlliteral frequency distribu- 
tion, and also on the number of blanks in the distribution* However, when 
the distribution contains a small nuafber of elements, ocular examination 
and evaluation becomes Increasingly difficult and uncertain. In such 
cases, recourse may be had to a mathematical test, known as the <{> test, 
to determine the relative monoalphabeticity or non-monoalphabetlclty of 
a distribution* 

b. Without going into the theory of probability at this time, or 
into the derivation of the formulas involved, let it suffice for the pre- 
sent to state that with this test the "observed value of <j>" (symbolized 
"by 4>o) is compared with the "expected value of <j> random" (<)> r ) and the 
"expected value of <j> plain" (<£ p) . The formulas are <J> r s.0385N(W-l) and, 
for English military text, <j>ps.0667N(N-l), where H is the total number of 
elements in the distribution. 15 The use of these formulas is best illus- 
trated by an example . 

c. The following short cryptogram with its accompanying uniliteral 
frequency distribution is at hand: 

QCYCH ADSKS Y Z Z Q E CYKYK QZYSK 

LSZAC TKFCX LKLKC ESZMX KISZX 



= b*£ N=50 

ABCDEFGHIJKLMNOPQRSTUVWXYZ 



15 The constant .0385 is the decimal equivalent of 1/26, i.e., the 
reciprocal of the number of elements in the alphabet. The constant .0667 
is the sum of the squares of the probabilities of occurrence of the indi- 
vidual letters in English plain text. These constants are treated in 
detail in Military Cryptanalysis, Part II. 



RESTRICTE D 



50 



REF ID: A56895 

RESTRICTED 

<f>o is calculated by applying the formula f(f-l) to the frequency (f) of 
each letter and totaling the result; or, expressed in mathematical 
notation, 1 ® <j> 0 = if (f-l) • Thus, 

£f = 2 6121 11 831 3 6l 356 = 50 

ABCDEFGHIJKLMNQPQRSTUVWXYZ 

Cf(f-l) : 2 30 020 00 5660 6 30 0 6 2030a 188 

For this distribution, <j>r= *0385N(N-l)s.0385 x 50 x 49 = 94, and 

<j>pr .0667W(N-l)s.0667 x 50 x 49 = 163. 

How since c{> 0 , 186, is In fact greater than <tp, we have a mathematical 
corroboration of the hypothesis that the cryptogram Is a monoalphabetic 
substitution cipher* If <j> 0 were nearer to <! > r , then the assumption would 
be that the cryptogram is not a monoalphabetic cipher* If <t> 0 were just 
half way between <j> r and <j>p, then decision would have to be suspended, 
since no further statistical proof in the matter is possible with this 
particular test* 1 ”? 

d. | Two further examples may be illustrated: 



s _ = ^=25 

(l) ABCDEFGHIJKLMNOPQRSTTJVWXYZ 

0 026122 0 1220 0 6 <f (f-l) =42 



The more usual mathematical notation for expressing $0 would be 
Z 

SI fi(fi-l), which is read as "the sum of all the terms for all integral 
' i=A Z 

values of f from A to Z inclusive. In turn, fi(fi-l) would be expanded 
"* ' i=A 

as fACfA-l)-** ■**fc(fC“ 1 ) + » • • • .+.fz(fz~ 1 ) * However, in the 

interest of simplicity the notation if (f-l) is employed; likewise, the 
notations (fa* and <f>p are employed in lieu of the more usual E($ r ) and E(<j)p) . 



^ Another method of determining the relative monoalphabetic ity of a 
cryptogram is based upon comparing the index of coincidence (abbr. X*C .) 
of the cryptogram under examination with the theoretical I.C. of plain 
text:* The I.C* of a message is defined as the ratio of <j> 0 to <fa*; thus, 



in the example above, the I.C* is 



188 

"W 



which equals 2* The theoretical 



I*C. of English plain text is 1*73, which is the decimal equivalent of 



j 2 £§£, the ratio of the " plain constant" 
*03°5 

I*C« of random text is 1, i.e., *038$ . 

^0355 



to the "random constant". 



The 



RESTRICTED 




51 



RESTRICTED 



REF ID: A5 68 95 



_ _ __« = W*25 * 

( 2 ) ABCDEFGHIJKLrfNOPQRSTUVWXYZ 

*0 002000600 02 00 0026 £f(f-l)sl8 

Since ‘both distributions have 25 elements, then for hoth 

4> r s .0385 x 25 x 24 s 21, and 

4>P S .0667 X 25 X 24 s 4o. 

Hence distribution (l) is monoalphabetic, while (2) is not* 

e. The student most not assume that statistical tests in cryptanal- 
ysis are infallible or absolute in themselves^"; statistical approaches 
serve only as a means to the end, in guiding the analyst to the most 
probably fruitful sources of attack. Since no one test in cryptanalysis 
gives definite proof of a hypothesis (in fact, not even a battery of tests 
gives absolute proof), all applicable statistical means at the disposal 
of the cryptanalyst should be used; thus, in examination for monoalphabet- 
icity, the <J> test, A test, and even other tests!9 could profitably be 
employed. To illustrate this point, if the <j> test is taken on the 
distribution of the plaintext letters of .the phrase 

A QUICK BROWN FOX JUMPS OVER THE LAZY DOG 



« = e N=33 

ABCDEFGHIJKLMNOPQRSTUVWXYZ 
2 2 12 2 2 *f(f-l)«20 

4r = ^p s 70 

it will be noticed that <J> 0 is less than half of 4r, thus conclusively 
"proving" that the letters of this phrase could not possibly constitute 
plain text nor a monoalphabetic encipherment of plain text in any lan- 
guage! The student should be able to understand the cause of this 
cryptologic curiosity. 

18 ihe following quotation from the Indian mathematician P. C. Maha- 

lanobis, concerning the fallibility of statistics, is particularly 
appropriate in this connection: "If statistical theory is right, predic- 

tions must sometimes come out wrong; on the other hand, if predictions 
are always rightj then the statistical theory must be wrong."-- Sankhya, 
Vol. 10, Part 3, p. 203. Calcutta, 1950. 

19 One of these, the chi-square test , will be treated in a subsequent 
text. 



RESTRICTED 



.52 



RESTRICTED 



REF ID : A56895 



28. Determining whether a cipher alphabet is standard (direct or 
reversed) or mixed ,- -a. ' Assttmlxig that the militeral frequency distri- 
bution for a given cryptogram has "been made, and that it shows clearly 
that the cryptogram is a substitution cipher and is monoalphabetic in 
character, a consideration of the nature of standard cipher alphabets 20 
almost makes it obvious how an inspection of the distribution will dis- 
close whether the cipher alphabet Involved is a standard cipher alphabet 
or a mixed cipher alphabet* If the crests and troughs of the distribu- 
tion occupy positions which correspond to the relative positions they 
occupy in the normal frequency distribution, then the cipher alphabet 
is a standard cipher alphabet* If this is not the case, then it is 
highly probable that the cryptogram has been prepared by the use of a 
mixed cipher alphabet • A mechanical test may be applied in doubtful 
cases arising from lack of material available for study; just what this 
test involves, and an illustration of its application will be given in 
the next section, using specific examples* 

b . Of course, if it has been determined that a standard cipher al- 
phabet is involved in a particular instance, it goes without saying that 
at the same time it must have been found whether the alphabet is a direct 
standard or reversed standard cipher alphabet. The difference between the 
distribution of a direct standard alphabet cipher and one of a reversed 
standard alphabet cipher is merely a matter of the direction in which the 
sequence of crests and troughs progresses— to the right, as is done in 
normally reading or writing the alphabet (ABC ,"m Z), or to the left, 
that is, in the reversed direction (Z C B A). With a direct standard 
cipher alphabet the direction in which the crests and troughs of the dis- 
tribution progress is the normal direction, from left to right; with a 
reversed standard cipher alphabet this direction is reversed, from right 
to left. 



20 See par. 12. 



RESTRICTED 



53 



REF ID : A568 95 




REF ID: A5 68 95 



RESTRICTED 



SECTION V 

UNILITERAL SUBSTITUTION WITH STANDARD CIPHER ALPHABETS 



Paragraph 

Types of standard cipher alphabets.... *•••••«»•*•• ••••••*• 29 

Procedure in encipherment and decipherment by means of 

uniliteral substitution. 30 

Principles of solution by construction and analysis of the 

uniliteral frequency distribution.,..........*..*.*........*..... 31 

Theoretical example of solution * 32 

Practical example of solution by the frequency method ••••••••••••••• 33 

Solution by completing the plain-component sequence *♦*.* ••••• 3^ 

Special remarks on the method of solution by completing the 

plain-component sequence ••••••*• 3? 

Value of mechanical solution as a short cut...*.**......*.***.***..* 36 

Basic reason for the low degree of cryptosecurity afforded by 

monoalphabet ic cryptograms involving standard cipher alphabets ... 37 

29* Types of standard cipher alphabets .— a. Standard cipher 
alphabets are of two types: ~ 

(1) Direct standard * in which the cipher component is the normal 
sequence but shifted to the right or left of its point of coincidence in 
the normal alphabet. Example: 

► 

Plain: ABCDEFGHIJKIMNOPQPSTUVWXIZ 

Cipher: QRSTUWDCfZABCDEFGHIJKLMNOP 

* 

It is obvious that the cipher component can be applied to the plain 
component at any one of 26 points of coincidence, but since the alphabet 
that results from one of these applications coincides exactly with the 
normal alphabet, a series of only 29 (direct standard) cipher alphabets 
results from the shifting of the cipher component* 

(2) Reversed standard, in which the cipher component is also the . . 

normal sequence but runs in the opposite direction from the normal* 
Example: 

► 

Plain: ABCDEEXrHIJKLMNOPQRSTUVWXYZ 

Cipher: QPONMUCJIHGEEDCBAZIXWVUTSR 

•4 

Here the cipher component can be applied to the plain component at any 
■of 26 points of coincidence, each yielding a different cipher alphabet. 
There is in this case, therefore, a series of 26 (reversed standard) 
cipher alphabets. 



RESTRICTEB - 



55 



RESTRICTEB - 



REF ID: A5 68 95 



b. It is often convenient to refer to or designate one of a series 
of cipher alphabets without ambiguity or circumlocution. The usual me- 
thod is to indicate the particular alphabet to which reference 'is made by 
citing a pair of equivalents in that alphabet, such as, in the example 
above, Ap=Q c . The key for the cipher alphabet Just referred to, as 

well as that preceding it, is Ap=Qc, and it Is said that the key letter 
for the cipher alphabet is Qq. 

c, The cipher alphabet in subpar. a(2), above, is also a reciprocal 
alphabet ; that is, the cipher alphabet contains 13 distinct pairs of equiv- 
alents which are reversible. For example, in the alphabet referred to, 

A p sQc and Qp=A c ; Bp=P c and PpSB c , etc. The reciprocity exists through- 
out the alphabet and is a result of the method by which it was formed. 
(Reciprocal alphabets may be produced by Juxtaposing any two components 
which are identical but progress in opposite directions .*5 

30. Procedure in encipherment and decipherment by means of uni - 
literal substitution. — a. When a message is enciphered by means of 
uniliteral substitution , or simple substitution (as it is often called), 
the individual letters of the message text are replaced by the single- 
letter equivalents taken from the cipher alphabet selected by prearrange- 
ment . Example : 

Messages EIGHTEEN PRISONERS CAPTURFD 

Enciphering alphabet: Direct standard, ApsT c 

Plain: ABCDEFGHIJKIMTOPQRSTUVWXYZ 

Cipher: TUVWXYZABCDEFGHIJKLMNOPQRS 

Letter-for-letter encipherment: 

EIGHTEEN PRISONERS CAPTURED 
XBZAMXXG IKBLOGXKL VTMSKKW 

The cipher text is then regrouped, for transmission, into groups of five. 
Cryptogram: 

XBZAM XXG3K BLHGX KLVTI MNKXW 

b. The procedure in decipherment is merely the reverse of that in 
encipEerment . The cipher alphabet selected by prearrangement is set up 
with the cipher component arranged in the normal sequence and placed above 
the plain component for ease in deciphering. The letters of the crypto- 
gram are then replaced by their plaintext equivalents, as shown below. 

Cipher: ABCDEFGHIJKU5N0PQPSTUVVDCYZ 

Plain: HIJmfflOPQRSTUVWXYZABCIffiPG 

The message deciphers thus: 

Cipher: XBZAM XXGHC BLHGX KLVTI MNKXW 

Plain: EIGHT EENFR ISONE RSCAP TUBED 

The deciphering clerk rewrites the text in word lengths: 

EIGHTEEN PRISONERS CAPTURED 



REOTRICTE D 



56 



RESTRICTE fr 



REF ID: A5 68 95 



c. In subpar, a, above, the ciyptogram was prepared in final form 
for transmission by dividing the cryptographic text into groups of five. 
This is generally the case in military communications involving cipher 
systems. It promotes acc\ir?icy in telegraphic transmission since an opera- 
tor knows he must receive s. definite number of characters in each group, 
no more and no less. Also, xc ■ viually makes solution of the messages by 
unauthorized persons more difficult because the length of the words, 
phrases, and sentences of the plain text is hidden. If the last group of 
the cipher text in subpar* 30 a had not been a complete group of five 
letters, it might have been completed by adding a sufficient number of 
meaningless letters (called nulls ) • 

31. Principles of solution by construction and analysis of the 
unlliteral frequency distribution . —a. The analysis of monoalphabetic 
cryptograms prepared by the use of standard cipher alphabets follows al- 
most directly from a consideration of the nature of such alphabets. Since 
the cipher component of a standard cipher alphabet consists either of the 
normal sequence merely displaced 1, 2, 3; . * * intervals from the normal 
point of coincidence, or of the normal sequence proceeding in a reversed- 
normal direction, it is obvious that the unlliteral frequency distribution 
for a cryptogram prepared by means of such a cipher alphabet employed 
monoalphabetically will show crests and troughs whose relative positions 
and frequencies will be exactly the same as in the unlliteral frequency 
distribution for the plain text of that cryptogram. The only thing that 
has happened is that the whole set of crests and troughs of the distribu- 
tion has been displaced to the right or left of the position it occupies 
in the distribution for the plain text; or else the successive elements of 
the whole set progress in the opposite direction. , Hence; it follows that', 
the correct determination of the plaintext value of the cipher letter 
marking any crest or trough of the uniliteral frequency distribution, 
coupled with the correct determination of the relative direction in which 
the plain component sequence progresses, will result at one stroke in the 
correct determination of the plaintext values of all the remaining 25 
letters respectively marking the other crests and troughs in that dis- 
tribution. The problem thus resolves itself into a matter of selecting 
that point of attack which will most quickly or most easily lead to the 
determination of the value of one cipher letter. The single word 
identification will hereafter be used for the phrase “determination of 
the value of a cipher letter"; to identify a cipher letter is to find 
its plaintext value. 

b. It is obvious that the easiest point of attack is to assume that 
the letter marking the crest of greatest frequency in the frequency 
distribution for the cryptogram represents Ep. Proceeding from this 
initial point, the identifications of the remaining cipher letters marking 
the other crests and troughs are tentatively made on the basis that the 
letters of the cipher component proceed in accordance with the normal 



RESTRICTED 



57 




RESTRICTE D 



REF ID: A5 68 95 



alphabetic sequence, either direct or reversed* If the actual frequency 
of each letter marking a crest or a trough approximates to a fairly close 
degree the normal or theoretical frequency of the assumed plaintext 
equivalent, then the Initial identification 9c=Ep may he assumed to he 
correct and therefore the derived identifications of the other cipher 
letters also may he assumed to he correct.! If the original starting 
point for assignment of plaintext values is not correct, or if the direc- 
tion of "reading" the successive crests and troughs of the distribution 
is not correct, then the frequencies of the other 25 cipher letters will 
not correspond to or even approximate the normal or theoretical frequencies 
of their hypothetical plaintext equivalents .on the basis of the initial 
identification* A new initial point, that is, a different cipher equiv- 
alent, must then he selected to represent Epj or else the direction of 
"reading" the crests and troughs must he reversed. This procedure, that 
is, the attempt to make the actual frequency relations exhibited hy the 
unillteral frequency distribution for a given cryptogram conform to the 
theoretical frequency relations of the normal frequency distribution in an 
effort to solve the cryptogram, is referred to technically. as "fitting the 
actual uniliteral frequency distribution for a cryptogram to the theoret- 
ical unillteral frequency distribution for normal plain text", or, more 
briefly, as " fitting the frequency distribution for the c r yptogram to the 
normal frequency distribution ", or, still more briefly, '’ fitting the dis - 
tribution to' the normal , 71 In statistical work the expression commonly 
employed in connection with this process of fitting an acthal distribu- 
tion to a theoretical one is "testing the goodness of fit." The goodness 
of fit may be stated in various ways, mathematical in character. 2 

c. In fitting the actual distribution to the normal. It is neces- 
sary -to regard the cipher component (that is, the letters A . • . Z marking 
the successive crests and troughs of the distribution) as partaking of 
the nature of a circle, that is, a sequence closing in upon itself, so that 
no matter with what crest or trough one starts, the spatial and frequency 
relations of the crests and troughs are constant. This manner of regard- 
ing the cipher component as being cyclic in nature is valid because it 
is obvious that the relative positions end frequencies of the crests and 
troughs of any unillteral frequency distribution must remain the same 
regardless of what letter is employed as the initial point of the distri - 
bution . Fig. 5 gives a clear picture of what is meant in this connect- 
ion, as applied to the normal frequency distribution. 



! The Greek letter 0 (theta) is used to represent a character or 
letter without indicating its identity. Thus, instead of the circum- 
locution "any letter of the plain text", the symbol 0p is used; and for 
the expression "any letter of the cipher text", the symbol 0 C is used. 

® One of these tests for expressing the goodness of fit, the % (chi) 
test, will be treated in Military Cryptanalysis, Part II. 



RESTRICTED 



58 




■REF ID: A5 68 95 



RESTRICTED 



g S: g ? ggg g 5 g 

gasgggg^gg ggggg gggg55 g g^gggg 
A B C D E F G H I J ;U TJ 0 ? Q R S ^ U ? H Y Z A F C D E F 



g == „ g ggg gg = g-. Is, g 

. ggggisg §-.55gggg ggggg gg^lgggssg 

. . .FEDCBAZYXWVUTSRQPONMLKJIHGFEDCBA 



Figure 5- 



d. In the third sentence of subparagraph b, the phrase "assumed to 
he correct" was advisedly employed in describing the results of the at- 
tempt to fit the distribution to the normal, because the final test of 
the goodness of fit in this connection (that is, of the correctness of 
the assignment of values to the crests and troughs of the distribution) 
is whether the consistent substitution of the plaintext values of the ci- 
pher characters in the cryptogram will yield intelligible plain text* If 
this is not the case, then no matter how close the approximation between 
actual and theoretical frequencies is, no matter how well the actual fre- 
quency distribution fits the normal, the only possible inferences are 
that (l) either the closeness of the fit is a pure coincidence in this 
case and that another equally good fit may be obtained from the same data, 
or else (2) the cryptogram involves something more than simple monoalpha- 
betic substitution by means of a single standard cipher alphabet. For 
example, suppose a transposition has been applied in addition to the 
substitution. Then, although an excellent correspondence between the 
uniliteral frequency distribution a nd the normal frequency distribution 
has been obtained, the substitution of the cipher letters by their assumed 
equivalents will still not yield plain text. However, aside from such 
cases of double encipherment, instances in which the uniliteral frequency 
distribution may be easily fitted to the normal frequency distribution 
and in which at the same time an attempted simple substitution fails to 
yield Intelligible texfc are rare. It may be said that, in practical 
operations whenever the uniliteral frequency distribution can be made to 
fit the normal frequency distribution, substitution of values will result 
in solution; and, as a corollary, whenever the uniliteral frequency 
distribution cannot be made to fit the normal frequency distribvition, 
the cryptogram does not represent a case of simple, monoalphabet ic 
substitution by means of a standard alphabet. 



RESTRICTED 



59 



RESTRICTED 



REF ID: A5 68 95 



32. Theoretical example of solution .— a. The foregoing principles 
will become clearer by noting the encryption and solution of a theoretical 
example. The following message is to be encrypted* 

HOSTILE FORCE ESTIMATED AT ONE REGIMENT INFANTRY AND TWO PLATOONS 
CAVALRY MOVING SOUTH ON QUINNIMONT PIKE STOP HEAD OF COLUMN NEARING ROAD 
JUNCTION SEVEN THREE SEVEN COMMA EAST OF GREENACHE SCHOOL FIRED UPON BY 
OUR PATROLS STOP HAVE DESTROYED BRIDGE OVER INDIAN CREEK. 

b* First, solely for purposes of demonstrating certain principles, 
the uniliteral frequency distribution for this plaintext message is 
presented in Figure 6. 



! 1 1 

S .*iiL S S S 

gssggggggg^ssggggg^ggggg^ § 
ABCDEFGHIJKLMNOPQRSTUVWXYZ 



Figure 6. 



a. Now let the foregoing message be encrypted monoalphabetically by 
the following standard cipher alphabet, yielding the cryptogram shown 
below and the frequency distribution sho^m in Figure 7* 

Plain - - - - ABCDEFGHIJKLMNOPQRSTUVWXYZ 
Cipher - - - GHIJKLMNOPQRSTUVWXYZABCDEF 

Plain - - - HOSTI LEFOR CEEST IMATE DATON EREGI MEHTI NFANT RYAND 

Cipher - - NUYZO EKLUX IKKYZ OSGZK JGZUT KXKMO SKTZO TLGTZ XEGTJ 

Plain - - - TWOPL ATOON SCAVA LRYMO VINGS OUTHO NQUIN NBION TPIKE 

Cipher - - ZCUVR GZUUT YIGBG RXESU BCTMY UAZNU TWAOT TOSUT ZVOQK 

Plain - - - STOPH EADOF COLUM NNEAR INGRO ADJUN CTION SEVER THREE 

Cipher - - YZWN KGJUL IURAS TTKGX OTMXU GJPAT IZOUT YKBKT ZHXKK 

Plain - - - SEVEN COMMA EASTO FGREE NAbRE SCHOO IFIRE DUPON BYOUR 

Cipher - - YKBKT IUSSG KGYZU LMXKK TGIXK YINUU RLOXK JAVUT HEUAX 

Plain PATRO LSSTO PHAVE BESTR OYEDB RIDGE OVERI NDIAN CREEK 

Cipher - - VGZXU RYYZU VNGBK JKYZX UEKJH XOJMK UBKXO TJOGT 33KKQ 



Cryptogram 



NUYZO 
SKTZO 
RXESU 
Y Z U V N 
IZOUT 
LMXKK 
VGZXU 
UBKXO 



R K L U X 
TLGTZ 
B 0 T M Y 
KGJUL 
YKBKT 
T G I X K 
RYYZU 
TJOGT 



IKKYZ 
XEGTJ 
UAZNU 
IURAS 
Z N X K IC 
YINUU 
VNGBK 
I X K K Q 



OSGZK 

ZCUVR 

TIAOT 

TTKC-X 

YKBKT 

RLOXK 

JKYZX 



JGZUT 

GZUUT 

TOSUT 

OTMXU 

IUSSG 

JAVUT 

UEKJH 



K X IC I-I 0 

YIGBG 
Z V 0 Q K 

GJPAT 
KGYZU 
HEUAX 
X 0 J II IC 



REOTRICTED 



60 



REF ID: A56895 




ABCDEFGHIJKLMNOPQRSTUVWXYZ 



Figure 7* 



d. Let the student now compare Figs. 6 and 7 # which have "been su- • 
per imposed in Fig. 8 for convenience in examination. Crests and troughs 
are present in "both distributions; moreover their relative positions and 
frequencies have not been changed in the slightest particular. Only the 
absolute position of the sequence as a whole has been displaced six 
places to the right in Fig. J } as compared with the absolute position of 
the sequence in Fig. 6. 




e. If the two distributions are compared in detail the student will 
clearly understand how easy the solution of the cryptogram would be to one 
who knew nothing about how it was prepared. For example, the frequency of 
the highest crest, representing Ep in Fig. 6 is 28; at an interval of four 
letters before Ep there is another crest representing Ap with frequency 
16. Between A and E there is a trough, representing the medium-frequency 
letters B, C, D. On the other side of E, at an interval of four letters, 
comes another crest, representing I with frequency l4. Between E and I 
* there is another trough, representing the medium-frequency letters F, G, B. 
Compare these crests and troughs with their homologous crests and troughs 
in Fig. 7. In the latter, the letter K marks the highest crest in the 
distribution with a frequency of 28; four letters before K there is an- 
other crest, frequency 1 6 , and four letters on the other side of K there 
is another crest, frequency l4. Troughs corresponding to B, C, D and F, 

Gr, H are seen at H, I, J and L, M, B in Fig. 7* In fact, the two dis- 
tributions may be made to coincide exactly, by shifting the frequency 
distribution for the cryptogram six places to the left with respect to 
the distribution for the equivalent plaintext message, as shown herewith. 




RESTRICTED 



REF ID: A5 68 95 



ABCDEFGHIJKLMNOPQRSTUVWXYZ 



2 

M 



=5 g 



6 5 5 5 S 5 S S 

& g 5= § g - g - g g 

gi:ggggggg-=:ggggg-ggggg«- § 

GHIJKLMNOPQRSTUVWXYZABCDEF 

Figure 9. 



f. Let us suppose now that nothing is known about the process* of 
encryptions and that only the cryptogram and its uniliteral frequency 
distribution is at hand# It is clear that simply bearing in mind the 
spatial relations of the crests and troughs in a normal frequency dis- 
tribution would enable the cryptanalyst to fit the distribution to the 
normal in this case. He would naturally first assume that K c sEp, from 
which it would follow that if a direct standard alphabet is involved, 
LcsFpjMcssGpi and so on, yielding the following (tentative) deciphering 
alphabet: 



Cipher ABCDEFGHIJKLMNOPQRSTUVWXYZ 

Plain UVWXYZABC D.,33 FGHIJKLMNOPQRST 

■r * 

jg. Now comes the final tesii £f these assumed values are substi- 
tuted in the cipher text, the plain text immediately appears. Thus: 

NUYZO RKLUX IKKYZ OSGZK JGZUT etc. 

HOSTI LEFOR GEEST I MATE DATON etc. 

h. It should be clear, therefore, lhat the initial selection of 
Gc as the specific key (that is, to represent Ap) in the process of 
encryption has absolutely no effect upon the relative spatial and 
frequency relations of the crests and troughs of the frequency distri- 
bution for the cryptogram. If Qc had been selected to represent Ap, 
these relations would still remain the same, the whole series of crests 
and troughs being merely displaced further to the right of the positions 
they occupy when Gc«Ap. 

33. Practical example of solution by the frequency method .— 
a. The case of direct standard alphabet ciphers . — (1) The following 
cryptogram is to be solved by applying the foregoing principles: 



N W N V H 
W B N J B 



C A X X Y 
C X 0 W N 



B J C C J 
F C X W B 



L T R W P 
« 

C X Y Y N 



X D A Y X 
C IT A B L 



B R C R X 
X U R W 0 



REDTRICTED 



62 



REF ID: A5 68 95 



RESTRICTED 

' (2) From the presence of so mars/ low-frequency letters such as B, 

W, and X it Is at once suspected that this is a substitution cipher. But 
to illustrate the steps, that must he taken in difficult cases in order to 
he certain in this respect, a uniliteral frequency distribution is con- 
structed, and then reference is to Charts 2 to 5 to note whether the 
actual numbers of vowels, high-, m&uU—-, end low-frequency consonants 
fall inside or outside the areas 5 ^limited by the respective curves • 



= _ _ s 9 g = _ S 

ABCDEFGHIJKLMNOPQRSTUVWXYZ 

Figure 10 a. 



Letters 


Frequency 


Position with respect to areas 
delimited by curves 


Vmrftla (iRTflJIY) 


* 10 

is 

26 

12 


Outside, chart 1. 
Outside, chart 2. 
Outside, chart 3. 
Outside, chart 4. 


Higb-frfirjuency Cnnnnn n.nfa (D R S T) 


Medium-frequency Consonants (BCFGHLMPV ff) — 
Tjniv-frRqiiftnr.y finnarmimts i(JKQX2) 


Total . 


60 

1 





(3) All four points falling completely outside the areas delimited by 
the curves applicable to these four classes of letters, the cryptogram is 
clearly a substitution cipher, 

(4) The appearance of the frequency distribution, with marked crests 
and troughs, indicates that the cryptogram is probably monoalphabetic . At 
this point the <f> test is applied to the distribution. The observed value 
of <f> is found ^o be 258, while the expected value of <f> plain and <j) random 
are calculated to be 236 and 136, respectively. The fact that the ob- 
served value is not only closer to but greater than <J>p is taken as 
statistical evidence that the cryptogram is monoalphabetic. Furthermore, 
reference being made to Chart 6 , the point of intersection of the message 
length (60 letters) and the number of blanks (8) falls directly on 

curve P; this is additional evidence that the message is probably mono- 
alphabetic • 

(5) The next step is to determine whether a standard or a mixed 
cipher alphabet is involved. This is done by studying the positions and 
the sequence of crests and troughs in the frequency distribution, and 
trying to fit the distribution to the normal. 



63 










REOTIUCTED' 



REF ID: A5 68 95 



(6) The first assumption to Tie made is that a direct standard cipher 
alphabet is involved. The highest crest in the distribution occurs over 
Xq. Let it he assumed that X c =Ep. Then Y c , Z c , Aq, • • . . =Fp, Gp, 

Hp, . • * ., respectively; thus: 



_ _ S cs g = _ s 000 

Cipher. ...A BCDEFGHIJKLMN0PQRSTUV¥XYZ 
Plain H IJKLMNOPQRSTUVWXYZABCDEFG 

Figure 10b. 

“ t 

It may he seen quickly that the approximation to the expected frequencies 
is very poor. There are too many occurrences of Jp, Qp, Up and Fp and 
too few occurrences of Up, Op, Rp, Sp, T p and Ap. Moreover, if a substi- 
tution is attempted on this oasis, the following is obtained for the first 
two cipher groups: 

Cipher N WNVHCAXXY 

"Plain text"U DUCO JHEEF 

This is certainly not plain text and it seems clear that X c is not E_, if 
the hypothesis of a direct standard alphabet cipher is correct. A 
different assumption will have to he made. 

(T) Suppose C c aEp. Going through the same steps as before, again 
no satisfactory results are obtained. Further trials^ are made along the 
same lines, until the assumption N c sEp is tested: 



gjf sr __ == ^ 5 

Cipher. ...A BCDEFGHIJKLMNOPQRSTUV¥XYZ 
Plain.. *..R STUVWXYZABCDEFGHIJKLMNOPQ 
* 

Figure 10c. 

(8) The fit in this case is quite good; possibly there are too few 
occurrences of Ap, Dp, and Rp. But the final test remains: trial of the 

substitution alphabet on the cryptogram itself. This is done and the 
results are as follows: 



C: 


N W N V H 


C A X X Y 


B 3 C C J 


L T R W P 


X D A Y X 


B R G 


R 


X 


P: 


ENEMY 


TROOP 


S A T I A 


CKING 


0 U R P 0 


SIT 


I 


0 


C: 


W B N J B 


C X 0 W N 


F C X W B 


C X Y Y N 


C N A B L 


X U R 


¥ 


0 


P: 


N S E A S 


T 0 F N E 


¥ T 0 N S 


T 0 P P E 


T E R S C 


0 L I 


N 


F 



ENEMY TROOPS ATTACKING OUR POSITIONS EAST OF NEWTON. PETERS COL 3UF* 



3 It is unnecessary, of course, to write out all the alphabets and 
pseudo-decipherments, as shown above, when testing assumptions. This is 
usually done mentally. 



IiEQTIlICTED 



6k 



REF ID: A5 68 95 



(9) It is always odvieablc to note tho specific key. In this case 
the correspondence between any plaintext letter and its cipher equivalent 
will indicate the key. Although other conventions ore possible, and 
equally valid, it is usual, however, to indicate the key by noting the 
cipher equivalent of Ap. In this case Ap- J c , 

b. The case of reversed standard alphabet ciphers «--(l) Let the 
following cryptogram and its frequency distribution be studied. 



F W F X L 
W R F J R 



QSVVU 
Q V E W F 



RJQQJ 
II Q V W R 



H Z B W D 
Q V U U F 



V P S U V 
Q F S R H 



RBQBV 

yiBRE 



(2) The preliminary steps illustrated above. Trader stibpar. a (l) 

to (4) inclusive, in connection with the test for class and monoalphabet- 
lcity, will here be omitted, since they are exactly the same in nature. 
The result is that the cryptogram is obviously a substitution cipher and 
is monoalphabetic • 

(3) Assuming that it is not known whether a direct or a reversed 
standard alphabet is involved, attempts are at once made to fit the fre- 
quency distribution to the normal direct sequence. If the student will 
try them he will soon find out that these are unsuccessful. All this 
takes but a few minutes. 

(4) The next logical assumption is now made, viz ., that the cipher 
alphabet is a reversed standard alphabet. When on this basis F c is 
assumed to be Ep, the distribution con readily be fitted to the normal, 
practically every crest and trough in the actual distribution correspond- 
ing to a crest or trough in the expected distribution. 



s a 2 _ _ _ isi^: 

Cipher. ...A BCDEFGHIJKLMNOPQRSTUVWXYZ 

Plain JIHGFEDCBAZYXWVUTSRQPONMLK 

Figure lOd. 

(5) When the substitution is made in the cryptogram, the following 
is obtained. 

Cryptogram... F WFXL QSVVU RJQQJ 

Plain text • • «E NEMY TROOP SATTA 

(6) The plaintext message is Identical with that in subpar. a. The 
specific key in this case is also Ap=J c . if the student Trill compare the 
frequency distributions in the two cases, he Trill note that the relative 
positions and extents of the crests and troughs are identical; they 
merely progress in opposite directions. 



RESTRICTED 



- \ 



REF ID: A5 68 95 



e. General note on solution by the frequency method .-- In actual 
practice, the procedure of subpars . a and b are given a more rapid treat- 
ment than that just described, the practical treatment being based, not 
on the initial finding of some single crest or trough, but rather on locat- 
ing the more readily-disoernlble clusters of crests which usually appear 
in a distributio n, su ch as the distinctive crest-patterns representing 
"A,.^#..!" and "RST" . These crest-patterns are searched for, with a 
quick scanning of the distribution, and then the relative placement with 
respect to each other is tested to see if it conforms to the expectation 
for a direct standard cipher alphabet, and, if not, then for a reversed 
standard cipher alphabet. During this latter step, which consists of 
little more than counting in one direction and then (when necessary) in 
the other, the blank (or near ly-bla rik) expectation of "UTC’ 1 followed by 
the characteristic curve for "IM'KiKP" and the blank "Q" are considered, 
as a means of either substantiating or invalidating the original 
"identification" of the crests, 

34. Solution by completing the plain-component sequence . -- 
a. The case of direct standard alphabet ciphers .— (l) The foregoing 
method of analysis, involving as it does the construction of a uniliteral 
frequency distribution, was termed a solution by the frequency method 
because it Involves the construction of a frequehby distribution and its 
study. There is, however, another method which is much more rapid, almost 
wholly mechanical, and which, moreover, does not necessitate the con- 
struction or study of any frequency distribution whatever. An under- 
standing of the method follows from a consideration of the method of 
encipherment of a message by the use of a single, direct standard cipher 
alphabet* 

( 2 ) Note the following encipherment: 

Message TWO CRUISERS SUM 

Enciphering Alphabet 

Plain ABCDEFGHIJKLM.HOPQRSTUVWXYZ 

Cipher GHIJKLMNOPQRSTUVWXYZABCDEF 

Encipherment 

Plain text TWO CRUISERS SUNK 

Cryptogram ZCU IXAOYKXY Y AT Q 

Cryptogram 

ZCUIX AOYKX YYATQ 

(3) The enciphering alphabet shown above represents a cc.sc wherein 
the sequence of letters of both components of the cipher alphabet is the 
normal sequence, with the sequence forma the cipher component merely 
shifted si:: places to the left (or 20 positions to the right) of the 
position it occupies in the normal alphabet. If, th.oref ci e, two strips 



RESTRICTED 



66 



RESTRICTE D 



REF ID: A5 68 95 



of paper bearing -fche letters of the normal sequence, equally spaced, are 
regarded as the two components of the cipher alphabet and are juxtaposed 
at all of the 25 possible points of coincidence, it is obvious that one 
of those 25 juxtapositions must correspond to the actual juxtaposition 
shown in the enciphering alphabet directly above . It is equally obvious 

that if a Record were kept of the rc wilts obtained by applying the values 
given at each juxtaposition to the letters of the cryptogram, one of these 
results would yield the plain text of the cryptogram. 

(4) Let the vork be systematized and the results set down in an 
orderly manner for examination. It Is obviously unnecessary to juxtapose 
the two components so that A c sA~, for on the assumption of a direct stan- 
dard alphabet, juxtaposing two direct normal components at their normal 
point of coincidence merely yields .plain text . The next possible juxta- 
position, therefore, is Ac»Bp. Let the juxtaposition of the two eliding 
strips therefore be A c =Bp, as shown here: 

Plain i®CIM?GHIJKIMfOPQPSTUVWXYZ 

Cipher— ABCDEFGHIJKLMNOPQBSTUYWXyZABCDEFGHIJKIM^OPQf^TUVVDCYZ 

The values given by this juxtaposition are substituted for the letters 
of the cryptogram and the following results are obtained. 

Cryptogram ZCUIX AOYKX YYATQ 

1st' Test— 1 "Plain text’ 1 A D V J Y B P Z L Y Z Z B U R 

This certainly is not intelligible text; obviously, the two components 
were not in the position indicated In this first test. The plain 
component is therefore slid one interval to the left, making Ac=Cp, and 
a second test is made. Thus 

Plain ABCDEFGHIJICLMNOPQRSTUVWXYZ 

Cipher — ABCDEFGHIJKLMOPQRSTUVWXYZABCDEFGHIJECIMHOPQPSTUVWXXZ 

Cryptogram ZCUIX AOYKX YYATQ 

2d Test— "Plain text" B E W K Z C Q A M Z A A C V S 

Neither does the second test result in disclosing any plain text. But, 

If the results of the two tests are studied a phenomenon that at first 
seems quite puzzling comes to light. Thus, suppose the results of the 
two tests are superimposed in this fashion. 

Cryptogram ZCUIX AOYKX YYATQ 

1st Test— —"Plain text" A D V J Y B P Z L Y Z Z B U R 
2d Test "Plain text" BEWKZ CQAMZ AACVS 

One of the strips should bear the sequence repeated. This permits 
juxtaposing the two sequences at all 2 6 possible points of coincidence 
so as to have a complete cipher alphabet showing at all times. 



RESTRICTED 



67 



REF ID: A5 68 95 



RESTRICTE D- 

(5) Note what has happened* The net result of the two experiments 
was merely to continue the normal sequence begun hy the cipher letters at 
the heads of the columns of letters. It is obvious that if the normal 
sequence is completed in each column the results will be exactly the same 
as though the whole set of 23 possible tests had actually been performed . 
Let the columns therefore be completed, as shown in Fig. 11. 

ZCUIXAOYKXYYATQ 
ADVJYBPZLYZZBUR 
BEWKZCQAMZAACVS 
CFXLADJRBNABBDWT 
DGYMBESCOBCCEXU 
EHZNCFTDPCDDFYV 
FIAODGUEQDEEGZW 
. GJBPEHVFREFFHAX 
HKCQFIWGSFGGIBY 
ILDRG JXHT6HHJCZ 
JMESHKYIUHIIKDA 
KNFT ILZJVIJJLEB 
LOGUJMAKW JKKMFC 
MPHVKHBLXKLLNGD 
NQIWLOCMYLMMOIIE 
ORJXMPDNZMNNPIF 
PSKYNQEOANOOQJG 
QTLZORFPBOPPRICH 
RUMAPSGQCPQQSLI 
SVNBQTHRDQRRTMJ 
0 C RU I S B B S SUNK 
UXPDS V JTFSTTVOL 
VYQETWKUGTUUWPM 
W Z R F U X L V H U V V X Q N 
XASGVYMWIVWWYBO 
YBTHYTZNXJWXXZSP 

Figure 11. 

An examination of the successive horizontal lines of the diagram discloses 
one and only one line of plain text, that marked by the asterisk and read- 
ing TWOCRUISERSSUNK. 

(6) Since each column in Fig. 11 is nothing but a normal sequence, 
it is obvious that instead of laboriously trriting down these columns of 
letters every time a cryptogram is to be examined, it would be more con- 
venient to prepare a set of strips each bearing the normal sequence 
doubled (to permit complete coincidence for an entire alphabet at any set- 
ting), and have them available for examining any future cryptograms. In 
using such a set of sliding strips in order to solve a cryptogram prepared 
by means of a single direct standard cipher alphabet, or to make a test to 
determine whether a cryptogram has been so prepared, it is only necessary 
to "set up" the letters of the cryptogram on the strips, that is, align 
them in a single row across the strips (by sliding the individual strips 




68 



RESTRICTED 



REF ID : A56895 



up ox' down) . The successive horizontal linos, called Generatrices (sin- 
gular, generatrix ) 5 , are then examined in a search for intelligible text. 

If the cryptogram really "belongs to this simple type of cipher, one of 
the generatrices will exhibit intelligible text all the way across; this 
text will practically invariably the plain text of the message. This 
method of analysis may he termed & solution by completing the plain - 
component sequence . Sometimes it is referred to as 1 ' running down* '~t he 
sequence. The px'inciple upon which the method is based constitutes one 
of the cryptanalyst’s most valuable tools 

b. The case of reversed standard alphabets . — ( 1 ) The method describ- 
ed under subpar. a may also be applied, in slightly modified form, in the 
case of a cryptogram enciphered "by a single reversed standard alphabet. 

The basic principles are identical in the two cases, as will now be demon- 
strated. 

(2) Let two sliding components be prepared as before, except that in 
this case one of the components must be a reversed normal sequence, the 
other, a direct normal sequence. 

(3) Let the two components be juxtaposed A to A, as shown below, 
and then let the resultant values be substituted for the letters of the 
cryptogram. Thus : 

CRYPTOGRAM 

NKSEP MYOCP 0 0 M T W 

Plain ABCDEPGHIJKLMOPQRSTUV^-TXYZ 

C ipher ZmrVTITSRqP0MiUCJmGFE]XnBAZmrra?SR0P0mCKJIHG]^IXn3A 

Cryptogram NKSEP MYOCP OOMTW 

1st Test— ’'Plain text 1 ’ IT Q I W L 0 C M Y L M M 0 H E 

(h) This does not yield intelligible text, and therefore the revers- 
ed component is slid one space forward and a second test is made. Thus: 

Plain ABCDEFGHIJKIMIOPQRSTtJ\A-JYYZ 

Cipher ZYXtmiTSROpOmjQlCJIHGEEDCBAZmmJTSRG^OM.ILKJIHGEEDCBA 

Cryptogram H K S E 13 MYOCP OOMTW 

2d Test “Plain text" 0 R J X M PDHZM II N P IP 

(5) Neither does the second.' test yield intelligible text. But let 
the results of the two tests he superimposed. Thus: 

Cryptogram NKSEP MYOCP 0 0 M $7 W 

1st Test— "Plain text" N 0, I W L 0 C M Y L M M O H E 

2d Test — “Plain text" ORJXM PDNZM NNPIF 



^ Pronounced: jSn'er-a-tri'sez and jen' er-a/tr^ks , respectively. 

r ■■ — — — — - ■ 

0 A set of heavy paper strips, suitable for use in completing the 
plain-component sequence, has "been prepared for use as a training aid in 
connection with the courses in Military Cryptanalysis. 



RESTRICTED 



69 



RESTRICTED REF ID : A568 95 

(6) It Is seen that the letters the "plain text" given by the 
second trial are merely the continuants of the normal sequences Initiated 
by the letters of the "plain text" given hy the first trial# If these 
sequences are "run down"— that is, completed within the columns— the 
results must Obviously be the same as though successive tests exactly 
similar to the first two were applied to the cryptogram, using one 
reversed normal and one direct normal component# If the cryptogram has 
really been prepared by means of a single reversed standard alphabet, 
one of the generatrices of the diagram that results from completing the 
sequences must yield Intelligible text# 

(7) Let the diagram be made, or better yet, if the student has 
already at hand the set of sliding strips referred to in footnote 6 to 
page 69, let him "set up" the letters given by the first trial# Pig* 12 
shows the diagram and indicates the plaintext generatrix. 

KKSEPMYOCPOOMTW 
H Q I W L 0 0 M Y L k M 0 H E 
ORJXMPDNZMNEPIF 
PSKYNQEOANOOQJG 
QTLZORFPBOPPRKH 
RUMAPSGQCPQQSLI 
SVNBQTHRDQRRTMJ 
*TWOCRUISERSSTJHK 
UXPDSV JTFSTTVOL 
VYQETWKUGTUUWPM 
WZRFUXLVHUVVXQN 
XASGViYMW IVWWYRO 
YBTHWZNXJWXXZSP 
ZCUIXAOYKXYYATQ 
ADV JYBPZLYZZBUR 
BEWKZC QAMZAACV S 
CFXLADRBNABBDWT 
DGYMBESCOBCCEXU 
EHZNCFTDPCBDFYV 
FIAODGUEQDEEGZW 
GJBPEHVFREFFHAX 
HKCQFIWGSFGGIBY 
ILDRGJXHTGHHJCZ 
JMESHKYIUHIIKDA 
KNFTILZJVIJJLEB 
LOGUJMiAKWJKKMFC 
MPHVKNBLXKLLNGD 

Figure 12. 

(8) The only difference in procedure between this case and the 
preceding one (where the cipher alphabet vas a direct standard alphabet) 
is that the letters of the cipher text ape first "deciphered" by means 
of any reversed standard alphabet and then the columns are "run down", 
according to the normal A B C . * . Z sequence. For reasons which will 




REF ID: A5 68 95 



■become apparent very soon, the first step in this method is technically 
termed converting the cipher letters into their plain-component equiva- 



lents; the second step is the same as before, 
component sequence. 






ecial remarks on the method of soluti 



_ _ i _^ —a. The terms employed to designate the steps 

in the solution set forth in par, 34b (8), viz ,, "converting the cipher 
letters into their plain-component equivalents" and "completing the plain- 
component sequence", accurately describe the process. Their meaning will 
■become more clear as the student progresses with the work. It may "be said 
that whenever the components of a cipher alphabet are known sequences, no 
matter how they are composed, the difficulty and time required to solve 
any cryptogram involving the use of those components is considerably re- 
duced, In some cases this knowledge facilitates, and in other cases is 



the only thing that makes possible, the solution of a very short cryptogram 



that might otherwise defy solution . Later on an example wxll be given to 
illustrate what is meant in this regard. 



b, ( The student should take note, however, of two qualifying expres- 
slons”that were employed in a preceding paragraph to describe the results 
of the application of the method. It was started that "one of the gener- 
atrices will exhibit intelligible text all the way across ; this text will 
practically invariably be the plain text." Will there 'ever he a case in 
which more than one generatrix will yield intelligible text through its 
extent? That obviously depends almost entirely on the number of letters 
that are aligned to form a generatrix. If a generatrix contains but a 
very few letters, only five, for example, it may happen as a result of 
pure chance that there will be two or more generatrices showing what 
might be "intelligible text," Note in Fig, 11 , for example, that there 
are several cases in which 3-letter ‘and 4-letter English words (LAD, COB, 
MESH, MAPS, etc,) appear on generatrices that are not correct, these 
words being formed by pure chance. But there is not a single case, in this 
diagram, of a 5-letter or longer word appearing fortuitously, because 
obviously the longer the word the smaller the probability of its appear- 
ance purely by chance; and the probability that two generatrices of 15 
letters each will both yield intelligible text along their entire length 
is exceedingly remote, so remote, in fact, that in practical cryptology 
such a case may be considered nonexistent .7 

£« The student should observe that in reality there is no difference 
whatsoever in principle between the two methods presented in subpars, a 
and b of par, 34* In the former the preliminary step of converting the 
cipher letters into their plain-component equivalents is apparently not 
present but in reality it is there. The reason for its apparent absence 
is that in that case the plain component of the cipher alphabet is ident- 
ical in all respects with the cipher component, so that the cipher letters 

T A person with patience and an inclination toward the curiosities of 
the science might construct a text of 15 or more letters which would yield 
two " intelligible" texts on the plain-component completion diagram. 



71 






REF ID: A5 68 95 



RESTRICTED 

require no conversion, or, rather, they are identical with the equivalents 
that would result if they were converted on the basis A c sAp, In fact, if 
the solution process had been arbitrarily initiated by converting the ci- 
pher letters into their plain-component equivalents at the setting AcsOp, 
for example, and the cipher component slid one interval to the right 
thereafter, the results of the first and second tests of par, 34a would 
be as follows: 

Cryptogram ZCUIXAO YKXYIATQ 

isT! Test— "Plain text" — N Q I W LOC MY L M M OH E 

2d Test— "Plain text" — ORJXMPBRZMNNPIF 

Thus, the foregoing diagram duplicates in every particular the diagram 
resulting from the first two tests under par, 34b: a first line of cipher 

letters , a second line of letters derived from them but showing externally 
no relationship with the first line, and a third line derived immediately 
from the second line by continuing the direct normal sequence, ‘ TM*i '*bint 
is brought to attention only for the purpose of showing that a sivye, 
broad principle is the basis of the general method of solution by complet- 
ing the plain -component sequence, and once the studtiri has this ’’trialy in 
mind he will have no difficulty whatsoever in realizing whe? j .principle 
is applicable, what a powerful crypt analytic tool it can be, and what 
results he may expect from its application in specific instances, 

d. In the two foregoing examples of the application of the prin- 
ciple, the components were normal sequences j but it should he clear to 
the student, if he has grasped what has been said in the preceding sub- 
paragraph, that these components may be mixed sequences which, if known 
(that is, if the sequence of letters comprising the sequences is known to 
the cryptanalyst) , can be handled just as readily as can components that 
are normal sequences. 

e. It is entirely immaterial at what points the plain and the cipher 
components are juxb&posed in the preliminary step of converting the cipher 
letters into their plain-component equivalents. For example, in the case 
of the reversed alphabet cipher solved in par* 34b, the two components 
were arbitrarily juxtaposed to give the value ApsAc, but they might have 
been juxtaposed at any of the other 25 possible points of coincidence 
without in any way affecting the final result, viz ., the production of 
one plaintext generatrix in the completion diagram. 

3 6, Value of mechanical solution as a short cut .— a. It is evident 
that the very first step the student should take in his attempts to solve 
an unknown cryptogram that is obviously a substitution cipher is to try 
the mechanical method of solution by completing the plain-component se- 
quence, using the normal alphabet, first direct, then reversed! This 
takes only a very few minutes and is conclusive in its results . It saves 
the labor and trouble of constructing a frequency distribution in case 
the cipher is of this simple type. Later on it will be seen how certain 
variations of this simple type may also be solved by the application of 
this method. Thus, a very easy short cut to solution is afforded, which 
even the experienced cryptanalyst never overlooks in his first attack on 
an unknown cipher. 

" nnmr.Tnmnn 



72 





REF ID : A56895 



RESTRICTED 

b, It Is Important now to note that if neither of the two foregoing 
attempts is successful in bringing plain text to light and tho cryptogram 
is quite obviously monoalphabetic in character, the cryptanalyst is war - 
ranted in assuming thab the, cryptogram involves a mixed cipher alphabet , 

37 » Basic reason for the low degree of ; .yptosecurity afforded by 
mono alphabetic cryptograms involving standard cipher alphabets . --The 
student has seen. that the solution of monoalphabetic cryptograms involving 
standard cipher alphabets is a very easy matter. Two methods of analysis 
were described, one involving the construction of a frequency distribu- 
tion, the other not requiring this kind of tabulation, being almost mech- 
anical in nature and correspondingly rapid. In the first of these two 
methods it was necessary to make a correct assumption as to the value of 
but one of the 2 6 letters of the cipher alphabet and the values of the 
remaining 25 letters at once became known; in the second method it was not 
necessary to assume a value for even a single cipher letter. The student 
should understand what constitutes the basis of this situation, viz ., the 
fact that the two components of the cipher alphabet are composed of known 
sequences . What if one or both of these components are, for the crypt- 
analyst, unknown sequences ? In other words, what difficulties will con- 
front the cryptanalyst if the cipher component of the cipher alphabet is 
a mixed sequence? Will such an alphabet be solvable as a whole at one 
stroke, or will it be necessary to solve its values individually? Since 
the determination of the value of one cipher letter in this case gives no 
direct clues to the value of any other letter, it would seem that the 
solution of such a cipher should involve considerably more analysis and 
experiment than has the solution of either of the two types of ciphers so 
far examined. The steps to be taken in the cryptanalysis of a mixed- 
alphabet cipher will be dis cussed in the next section, 

^ There is but one other possibility, already referred to under 
subpar. 31d which involves the case where transposition and monoalphabetic 
substitution processes have been applied in successive steps. This is 
unusual, however, and will be discussed in its proper place. 



frEDTtaCTED 



73 



REF ID 



restricted 



(blank) 



restricted 



RESTRICTED 



REF ID: A5 68 95 



SECTION VI 

UNILITERAL SUBSTITUTION WITH MIXED CIPHER ALPHABETS 



Paragraph 

Literal keys and numerical keys ••«..«.. •••«••••*. « 38 

Types of mixed cipher alphabets •••••• * ••••••••••.*• . 39 

Additional remarks on cipher alphabets.. ..•••*••••• 40 

Preliminary steps in the analysis of a monoalphabet ic, mixed- 

alphabet cryptogram. 4l 

Preparation of the work sheet ' 42 

Triliteral frequency distributions 43 
Classifying the cipher letters Into vowels and consonants 44 
Further analysis of the letters representing vowels and consonants*. 45 

Substituting deduced values in the cryptogram, * ••••• ••••« 46 

Completing the solution. 47 

General remarks on the foregoing solution. • ...••• ••••.•••••••• 48 

The "probable-word” method; its value and applicability. , 49 

Solution of additional cryptograms produced by the same 

components 50 

Derivation of key words * ••.••••••••««••• 51 



38. Literal keyB and numerical keys .— a. As has been previously 
mentioned, most cryptosystems involve the use of a specific key to con- 
trol the steps followed in encrypting or decrypting a specific message 
(see subpar. $jb) • Such a key may be in literal form or in numerical form. 

b . , It is convenient to designate a key which is composed of letters 
as a literal key . As already mentioned, a literal key may consist of a 
single letter, a single word, a phrase, a sentence, a whole paragraph, or 
even a book; and, of course, it may consist merely of a sequence of let- 
ters chosen at random, 

c. Certain cryptosystems involve the use of a numerical key, which 
may consist of a relatively long sequence of numbers difficult or impos- 
sible for the average cipher clerk to memorize. Several simple methods 
for deriving such sequences from words, phrases, or sentences have been 
devised, and a numerical key produced by any of these methods is called a 
derived numerical key (as opposed to a key consisting of randomly-selected 
numbers) . One of the commonly-used methods consists of assigning numer- 
ical values to the letters of a selected literal key in accordance with 
their relative positions in the ordinary alphabet, as exemplified in the 
following subparagraph . 



R EOTRICTED 



75 



REF ID: A5 68 95 



RESTRICTED 

d. Let the prearranged key word he the word LOGISTICS. Since C, 
the penultimate letter of the key word, appears in the normal alphabet 
before any other letter of the key word, it is assigned the number it 

LOGISTICS 

1 

The next letter of the normal alphabet that occurs In the key word is G, 
which is assigned the number 2. The letter I, which occurs twice in the 
key word, is assigned the number 3 for its first occurrence and the num- 
ber 4* for its second occurrence; and so on. The final result is: 

LOGISTICS 

562379418 

This method of assigning the numbers is very flexible and varies with 
different uses to which numerical keys are put. It may, of course, be 
applied to phrases or to sentences, so that a very long numerical key, 
ordinarly impossible to remember, may be thus derived at will from an 
easily-remembered key text . 

e. As far as the cryptanalyst is concerned, the derivation of a 
numerical key from a specific literal key is of interest to him because 
this knowledge may assist in subsequent solutions of cryptograms prepared 
according to the same basic system, or in identifying the source from 
which the literal key was selected - perhaps an ordinary book, a magazine, 
etc. However, it should be pointed out that in some instances the crypt- 
analyst may be unaware that a literal key has in fact been used as the 
basis for deriving a numerical key. 

39 « Types of mixed cipher alphabets .— a. It will be recalled that 
in a mixed cipher alphabet the sequence of letters or characters in one 
of the components (usually the cipher component) does not correspond to 
the normal sequence. There are various methods of composing the. sequence 
of letters or elements of this mixed component, and those which are based 
upon a scheme that is systematic in its nature are very useful because 
they make possible the derivation of one or more mixed sequences from any 
easily-remembered word or phrase, and thus do not necessitate the carry- 
ing of written memoranda. Alphabets involving a systematic method of 
mixing are called systematically-mixed cipher alphabets . 

b. One of the simplest types of systematically-mixed cipher alpha- 
bets is the keyword-mixed alphabet . The cipher component consists of a 
keyword or phrase (with repeated letters, if present, omitted alter 



RESTRICTED 



76 



RESTRICTED 



REF ID : A56895 



their first occurrence )•*•, followed by the letters of the alphabet in 
their normal sequence (with letters already occurring in the key omitted 
of course). Example, with GOVERNMENT as the keyword: 

Plain: ABCDEFGHIJKIMNOPQRSTUVWXYZ 

Cipher: GCTORNMTABCDFH1JKLPQSUWXYZ '' “ 

c. It is possible to disarrange the sequence constituting the 
cipher component even more thoroughly by applying a simple method of 
transposition to the keyword-mixed sequence. Two common methods are 
illustrated below, using the key word TELEPHONY. 

(l) Simple columnar transposition : 

TELPHONY 
ABCDFGIJ 1 
KMQRSUVW ! 

X Z 

Mixed sequence (formed by transcribing the successive columns from left 
to right): 



TAKXEBI'dZLCQPDRHFSOGUNIVYJW 
(2) Numerically-keyed columnar transposition : 

7-1-3-6-2-5-4-8 
TELPHONY 
ABCDFGIJ 
KMQRSUVW 
X Z 

Mixed sequence (formed by transcribing the columns in a sequence deter- 
mined by the numerical key derived from the key word itself) : 

EBMZHFSLCQNIVOGUPDRrAKXYJW 



Mixed alphabets formed by including all repeated letters of the 
key word or key phrase in the cipher component were common in Edgar 
Allan Poe *s day but are impractical because they are ambiguous, making 
decipherment difficult ; an example: 

Plain: ABCDEFGHIJJCLMNOPQRSTUVWXYZ 

C ipher : NOWISTH^IMEFORALLGOODMENT 

Cipher: ABCI^GHIJKIMNOPQPSTIJVWXXZ 

Plain: P VHMSGD QJCAB OEF C 

L J RWYN I 
X T Z 

TJ 

The average cipher clerk would have considerable difficulty in decrypting 
a cipher group such as TOOET, each letter of which has three or more 
equivalents, and from which the plaintext fragments (N)HJTH., ..IT THI(S), 
TP THI..., etc. can be formed on decipherment. 



(a) Alphabet for enciphering.— 

(b) Inverse form of (a), 

for deciphering. — — — — 



nEOTRICTE D 



77 



REF ID: A5 68 95 



RESTRICTED 

d. The last two systematically-mixed sequences are examples of 
transposition-mixed sequences . Almost any method of transposition may he 
used to produce such sequences, 

e. Another simple method of forming a mixed sequence is the deci - 
mation method . In this method, letters in the normal alphabet, or in a 
keyword-mixed sequence, are "counted off" according to any selected in- 
terval. As each letter is decimated— that is, eliminated from the basic 
sequence by counting off— it is entered in a separate list to form the 
new mixed sequence. For example, to form a mixed sequence by this method| 
from a keyword-mixed sequence based on the key phrase SBUG A SONG OF 
SIXPENCE with 7 the interval selected, proceed as follows: 

Keyword-mixed (or basic) sequence: 

SINGAOFXPECBDHJKlMQPTUWyZ 

'When the letters are counted off by 7 ’s from left to right, F will be the 
first letter arrived at, H the second, T the third: 

SINGAOy'XPECBDjfJKLMQR^UVWYZ 

123^562123^56jri23^567 

These letters are entered in a separate list (F first, H second, T third, 
and so on) and eliminated from the keyword-mixed sequence. When the 
end of the keyword-mixed sequence is reached, return to the beginning, 
skipping the letters already eliminated: 

S^NGAO^XP^CBDjfJKLtfQRTfUVWYZ 

1 2 3 4 5 

671234 562123 4 5 6 £ 

The decimation-mixed sequence: 

FHTIEMZPQNIWCrVBSIXAGOKYJOT 

f. Practical considerations, of course, set a limit to the complex- 
ities that may be introduced in constructing systematically-mixed alpha- 
bets. Beyond a certain point there is no object in further mixing. The 
•greatest amount of mixing by systematic processes will give no more se- 
curity than that resulting from mixing the alphabet by random selection, 
such as by putting the 26 letters in a box, thoroughly' shaking them up, 
and then drawing the letters out one at a time. Whenever the laws of 

• chance operate in the construction of a mixed alphabet, the probability 
of producing a thorough disarrangement of letters is very great. Random - 
mixed alphabets give more cryptographic security than do the less compli- 
cated systematically-mixed alphabets, because they afford no clues to 
positions of letters, given the position of a few of them. Their chief 
disadvantage is that they must be reduced to writing, since they cannot 
readily be remenibered, nor can they be reproduced at will from an easily- 
remembered key word. 



RESTRICTE D 



78 



REF ID : A56895 



RESTRICTED — 

UOj. Additional remarks on cipher alphabets . --a. All cipher alpha- 
bets may be classified on the basis of their arrangement as enciphering 
or deciphering alphabets . An enciphering alphabet is one in which the 
sequence of letters in the plain component coincides with the normal 
sequence and is arranged in that manner for convenience in encipherment. 
In a deciphering alphabet the sequence of letters in the cipher component 
coincides with the normal, for convenience in deciphering. For example, 
(l), below, shows a mixed cipher alphabet arranged as an enciphering al- 
phabet; (2) shows the corresponding deciphering alphabet. An enciphering 
alphabet and its corresponding deciphering alphabet present an Inverse 
relationship to each other. To invert a deciphering alphabet is to write 
the corresponding enciphering alphabet; to invert an enciphering alphabet 
is to write the corresponding deciphering alphabet. 

Enciphering Alphabet 

f v Plain: ABCDEFGHIJKIMNOPQRSTUVWXyZ 

Cipher: JKQVXZWESTRNUIOLGAPHCMYBDF 

Deciphering Alphabet 

, Cipher: ABCDEFGHIJKLMNOPQRSTUVWXyZ 

< 2 ' Plain: KCOYHZ(^NABPVI.OSCKIJMDGEWF 

b. A series of related reciprocal alphabets may be produced by 
juxtaposing at all possible points of coincidence two components which 
are identical, but progress in opposite directions. This holds regardless 
of whether the components are composed of an even or an odd number of 
elements. The following reciprocal alphabet is one of such a series of 
2 6 alphabets: 

Plain: HJTORAULICBEFGJldlNOPQSTVWXZ 

Cipher: GFEBCILUAI^yHZXWVTSQPONMKJ 

A single or isolated reciprocal alphabet may be produced in one of two 
ways: 

(1) By constructing a complete reciprocal alphabet by arbitrary or 
random assignments of values in pairs. That is, if Ap is made the 
equivalent of K c , then Kp is made the equivalent of Ajj if Bp is made Rq, 
then Rp is made B c , and so on. If the two components thus constructed 
are slid against each other no additional reciprocal alphabets will be 
produced. 

(2) By juxtaposing a sequence comprising an even number of elements 
against the same sequence shifted exactly half way to the right (or left), 
as seen below: 



ABCDEFGHIJKIMNOPQRSTUVWXyZ, 

ABCDEFGHIJKLMH^OPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZ 



■ RESTRICTED - 



79 




REF ID: A5 68 95 



REGTRICTEB - 

7 n. Preliminary steps In the analysis of a monoalphabet ic , mixed - 
alphabet cryptogram . — a. The student is now ready to resume his crypt- 
analytic studies. Note the following cryptogram: 

SFDZF IOGKL PZFGZ DYSEF HBZDS GVHTF UFLVD FGYVJ VFVHT GADZZ ATTYD ZYFZJ 

2ZTGPT VTZBD VFHTZ DFXSB GIDZY VTXOI YVTEF VMGZZ THLLV XZDFM BTZAI TYDZY 

BDVFH TZDFK ZDZZJ SXXSG ZYGAV FSLGZ ETHHT CDZRS VTYZD OZFFH TZAIT YDZYG 

AVDGZ ZTK HI TYZ YS DZGHU ZFZTG UPGDI XWGHX ASR UZ DFU 3D EGHTV EAGXX 

b. A casual inspection of the text disclosed the presence of sev- 
eral long repetitions as well as of many letters of normally low fre- 
quency, such as F, G, V, X, and Z ; on the other hand, letters of normally 
high frequency, such as the vowels, and the consonants N and R, are rel- 
atively scarce. The cryptogram is obviously a substitution cipher and 
the usual mechanical tests for determining whether it is possibly of the 
monoalphabetlc, standard-alphabet type are applied. The results being 
negative, a uniliteral frequency distribution is immediately constructed, 
as shown in Figure 13, and the <f> test is applied to it. 



I § 

A B 

8 4 

4>p=3668 (j> r =2iiT <{>0=3862 
Figure 13. 

c. The fact that the frequency distribution shows very marked 
crests and troughs indicates that the cryptogram is very probably mono- 
alphabetic, and the results of the <f> test further support this hypothesis. 
The fact that the cryptogram has already been tested by the method of 
completing the plain-component sequence and found not to be of the mono- 
alphabetic, standard-alphabet type, indicates with a high degree of 
probability that it involves a mixed cipher alphabet. A few moments might 
be devoted to making a careful inspection of the distribution to insure 
that it cannot be made to fit the normal; the object of this would be to 
rule out the possibility that the text resulting from substitution by a 
standard cipher alphabet had not subsequently been transposed. But this 
inspection in this case is hardly necessary, in view of the presence of 
long repetitions in the message.* (See subpar. 25g.) 



1 g 

g g g'g ? 'll 

CDEFGHIJKLMNOPQRSTUVWXYZ 

1 23 8 19 19 16 10 3 2 8 2 0 3 6 0 2 10 22 8 IS 1 8 14 35 



^ This possible step is mentioned here for the purpose of making it 
clear that the plain-component sequence completion method cannot solve a 
case in which transposition has followed or preceded monoalphabet ic sub- 
stitution with standard alphabets. Cases of this kind will be discussed 
in a later text. It is sufficient to indicate at this point that the - 
frequency distribution for such a combined substitution-transposition 
cipher would present the characteristics of a standard alphabet cipher 
and yet the method of completing the plain-component sequence would fail 
to bring oub any plain texb. 



RESTRICTED 



80 




REF ID: A5 68 95 



nEBTRICTED . 

d. One might, of course, attempt to solve the cryptogram "by applying 
the simple principles of frequency. One might, in other words, assume 
that Z c (the letter of greatest frequency) represents Ep, D c (the letter 
of next greatest frequency) represents T-n, and so on. If the message 
were long enough this simple procedure might more or less quickly give 
the solution. But the message is relatively short and many difficulties 
would he encountered. Much time and effort would he expended unnecessar- 
ily, because it is hardly to he expected that in a message of only 235 
letters the relative order of frequency of the various cipher letters 
should exactly coincide with, or even closely approximate the relative 
order of frequency of letters of normal plain text found in a count of 
50,000 letters. It is to he emphasized that the beginner must repress 
the natural tendency to place too much confidence in the' generalized prin - 
ciples of frequency and to rely too much upon them . It Is far better to 
bring into effective use certain other data concerning normal plain text, 
such as digraphic and trlgraphic frequencies. 

h2» Preparation of the work sheet . — a. The details to he- considered 
in this paragraph may at first appear to he superfluous, hut long expe- 
rience has proved that systematization of the work and preparation of the 
data in the most utilizahle, condensed form is most advisable, even if 
this seems to take considerable time. In the first place, if it merely 
serves to avoid Interruptions and irritations occasioned by failure to 
have the data in an Instantly available form, it will pay by saving men- 
tal wear and tear. In the second place, especially in the case of com- 
plicated cryptograms, painstaking care in these details, while it may not 
always bring about success, is often the factor that' is of greatest 
assistance in ultimate solution. The detailed preparation of the data 
may be irksome to the student, and he may be tempted to avoid as much of 
it as possible, but, unfortunately, in the early stages of solving a 
cryptogram he does not know (nor, for that matter, does the expert always 
know) just which data are essential and which may be neglected. Even 
though not all of the data may turn out to have been necessary, as a gen- 
eral rule, time is saved in the end if all the usual data are prepared as 
a regular preliminary to the solution of most cryptograms. 

b. First, the cryptogram is recopied in the form of a work sheet . 
This sheet should be of a good quality of paper so as to withstand con- 
siderable erasure. If the cryptogram is to be copied by hand, cross- 
section paper of -^-inch squares is extremely useful. The writing should 
be in Ink, and plain, carefully-made roman capital letters should be used 
in all cases .3 If the cryptogram is to be copied on a typewriter, the 
ribbon employed should be impregnated with an ink that will not smear or 
smudge under the hand. 



3 

It is advisable to use, for this purpose, the system of standardized 
manual printing adopted by Service communications personnel. The use of 
this system, which is included in Appendix 7, assures that work sheets 
are completely legible, not only to the person preparing them, but to 
others as well. 



RESTRICTED 



81 



REF ID: A5 68 95 



RESTRICTED 

c. The arrangement of the characters of the cryptogram on the work 
sheet" - is a matter of considerable importance . If the cryptogram as first 
obtained is in groups of regular length (usually five characters to a 
group) onfl if the uniliteral frequency distribution shows the cryptogram 
to be monoalphabetlc , the characters should be copied without regard to 
this grouping. It is advisable to allow one space between letters (this 
Is especially true for work sheets prepared on the typewriter), and to 
write a constant number of letters per line, approximately 25. At least 
two spaces, preferably three spaces, should be left between horizontal 
lines, to allow room for multiple assumptions. Care should be taken to 
avoid crowding the letters in any case, for this is not only confusing to 
the eye but also mentally irritating when later it is found that not 
enough space has been left for making various sorts of marks or indica- 
tions . If the cryptogram is originally In what appears to be word lengths 
(and this is the case, as a rule, only with the cryptograms of amateurs), 
naturally it should be copied on the work sheet in the original group- 
ings. If further study of a cryptogram shows that some special grouping 
is required, it is often best to recopy it on a fresh work sheet rather 
than to attempt to Indicate the new grouping on the old work sheet. 

d. In order to be able to locate or refer to specific letters or 
groups of letters with speed, certainty, and without possibility of con- 
fusion, it is advisable to use coordinates applied to the lines and 
columns of the texb as it appears on the work sheet. To minimize possi- 
bility of confusion, it is best to apply letters to the horizontal lines 
of the text, numbers. to the vertical columns^. In referring to a letter, 
the horizontal line in which the letter is located is usually given first. 
Thus, referring to the work sheet shown below, coordinates A17 designate 
the letber Y, the 17th letter in the first line. The letter I is usually 
omitted from the series of line indicators so as to avoid confusion with 
the figure 1. If lines are limited to 25 letters each, then each set of 
100 letters of the texb is automatically blocked off by remembering that 

4 lines constitute 100 lebters. 

e. Above each character of the cipher texb may be some indication 
of the frequency of that character in the whole cryptogram. This indi- 
cation may be the actual number of times the character occurs, or, if 
colored pencils are used, the cipher letters may be divided up into three 
categories or groups — high-frequency,* medium-frequency, and low-frequency. 
It 'is perhaps simpler, if clerical help is available, to indicate the 
actual frequencies. This saves constant reference to the frequency 
tables, which interrupts the train of thought, and saves considerable 
time In the end, since it enables the student better to visualize fre - 
quency-patterns of words. In any case, it is recommended that the fre- 
quencies of the letters comprising the repetitions be inscribed over their 

■*' In some cryptosystems, certain low-frequency letters are employed as 
word separators to indicate the end of a word; if the meaning of these 
letters Is discovered, it is tantamount to having the cryptogram in word 
lengths and thus the work sheet is made accordingly. See also in this 
connection the treatment on word separators in Section VII . 



RESTRICTED 



82 



REF ID: A5 68 95 



RESTRICTED 

respective letters; likewise, tile frequencies of the first 10 and last 10 
letters should also he inscribed, as these positions often lend themselves 
readily to attack. ? 

f. After the special frequency distribution, explained in Par. 1*3 
belovj has been constructed, repetitions of digraphs and trigraphs should 
be underscored. In so doing, the student should be particularly watchful 
for trigraphlc repetitions which can be further extended into tetragraphs 
and polygraphs of greater length. Repetitions of more than ten charac- 
ters should be set off by heavy vertical lines , as they indicate repeated 
phrases and are of considerable assistance in solution. If a repetition 
continues from one line to the next, put an arrow at the end of the under- 
score to signal this fact. Reversible digraphs and trigraphs should also 
be indicated by an underscore with an arrow pointing in both directions. 
Anything which strikes the eye as being peculiar, unusual, or significant 
as regards the distribution or recurrence of the characters should be 
noted. All these marks should, if convenient, be made with ink so as not 
to cause smudging. The work sheet will now appear as shown below (not 
all the repetitions are underscored): 





1 


2 


3 


4 


6 


0 


7 


8 


9 


10 


11 


12 


13 


14 


15 


16 


17 


18 


19 


20 


21 


22 


23 


24 


25 




10 


10 


23 


35 


10 


10 


3 


10 


15 


6 


5 


35 


19 


19 


35 


23 


14 


10 


5 


19 


15 


4 


35 


23 


10 


A 


s 


F 

«- 


D 


z 
— > 


F 


I 


0 


G 


H 


L 


p 


z 


F 


G 


z_ 


X 


_Y 


s 


p 


F 


H 


B 


z 


D 


s 




10 


16 


16 


22 


19 


6 


6 


5 


16 


23 


19 


10 


14 


16 


3 


16 


19 


10 


15 


22 


19 


8 


23 


35 


35 


B 


6 


V 


H 


T 


F 


u 


p 


L 


V D 


F 


G 


Y 


V 


j 


V 


F 


V 


H 


T 


G 


A 


D 


z 


z 




8 


10 


22 


14 


23 


35 


14 


19 


35 


3 


35 


22 


19 


5 


22 


16 


22 


35 


4 


23 


10 


19 


16 


22 


35 


0 


A 


i 


T 


Y 


D 


z 


Y 


F 


z 


J. 


z 


T 


G 


p 


T 


V 


T 


z 


B 


D 


V 


F 


H 


T 


z 




23 


10 


8 


4— 

10 


4 


— » 
10 


10 


23 


35 


14 


16 


22 


8 


8 


10 


14 


10 


22 


3 


19 


10 


2 


10 


35 


35 


D 


D 

« — 


F 


X 


s 


B 


G 


I 


D 


z 


Y 


V 


T 


X 


0 


I 


Y 


V 


T 


E 


F 


V 


M 


G 


z 


z 




22 


16 


5 


5 


16 


8 


35 


23 


19 


2 


15 


22 


35 


8 


10 


22 


14 


23 


85 


14 


4 


23 


16 


19 


16 


E 


T 


H 


L 


L 


V 


X 


z_ 


D 


F 


M 


H. 


X 


_z_ 


_A. 


j_ 


X 


X 


X 


x 


_Y 


B 


X 


x 


X 


x 




22 


35 


23 


19 


2 


35 


23 


35 


35 


3 


10 


8 


10 


10 


19 


35 


14 


19 


8 


is 


10 


10 


5 


19 


35 


F 


JL 


JL 


D_ 


F 


K 


Z 


D 


Z 


z 


j 


S 


X 


I 


S 


G 


z 


Y 


G 


A 


V 


F 


S 


L 


G 


z 




V" 

23 


22 


15 


15 


22 


1 


23 


35 


2 


10 


is 


22 


14 


35 


23 


8 


35 


19 


19 


15 


22 


35 


8 


10 


22 


G 


D 


T 


H 


H 


T 


c 


D 


z 


R 


s 


V 


T 


Y 


Z 


D 


0 


z 


F 


F 


H_ 


X 


z 


A, 


x 


X 




M 


23 


35 


14 


19 


8 


IS 


23 


19 


35 


35 


22 


2 


15 


10 


22 


14 


35 


14 


10 


23 


36 


19 


15 


5 


H 


( Y 


_D_ 


z_ 


Y 


G 


A 


V. 


JL 


_G 


z 


z 


T 


K 


H 


I_ 


X 


Y 


z 


Y 


S 


D 


z 


G 


H 


u 




35 


19 


85 


22 


19 


5 


s 


10 


23 


10 


8 


1 


10 


16 


8 


8 


10 


2 


6 


85 


23 


19 


6 


10 


23 


J 


Z 


F 


z 


T 


G 


u 


p 


G 


D 


I 


X 


W 


G 


H 


X 


A 


S 


R 


u 


z 


x 


_F 


u 


I 


D 




3 


10 


16 


22 


is 


3 


8 


19 


8 


8 
































K 


E 


G 


H 


T 


V 


E 


A 


G 


X 


X 

































^ See Appendix 4 in this connection. 



REOTRICTE B 



83 



REF ID : A56895 



RESTRICTED 

43. Trilateral frequency distributions .— a. In what has gone before, 
a "type of frequency distribution known as a unilateral frequency distri- 
bution was used. This, of course, shows only the number of times each 
individual letter occurs . In order to apply the normal digraphic and 
trigraphic frequency data (given in Appendix 2) to the solution of a 
cryptogram of the type now being studied, it is obvious that the data 
with respect to digraphs and trigraphs occurring in the cryptogram should 
be compiled and should be compared with the data for normal plain text. 

In order to accomplish this in suitable manner, it is advisable to con- 
struct a more comprehensive form of distribution termed a triliteral 
frequency distribution .” 

b. Given a cryptogram of 50 or more letters and the task of deter- 
mining what trigraphs are present in the cryptogram, there are three ways 
in which the data may be arranged or assembled. One may require that the 
data show (l) each letter with its two succeeding letters ; (2) each let- 
ter with its two preceding letters; (3) each letter with one preceding 
letter and one succeeding letter. 

c. A distribution of the first of the three foregoing types may be 
designated as a "triliteral frequency distribution showing two suffixes"; 
the second type may be designated as a "triliteral frequency distribution 
showing two prefixes"; the third type may be designated as a "triliteral 
frequency distribution showing one prefix and one suffix." Quadriliteral 
and pentaliteral frequency distributions may occasionally be found useful. 

d. Which of these three arrangements is to be employed at a specific 
time depends largely upon what the data are intended to show. For present 
purposes, in connection with the solution of a monoalphabetic substitution 
cipher employing a mixed alphabet, possibly the third arrangement , that 
showing one prefix and one suffix, is most satisfactory. 

e. It is convenient to use jj-Inch cross-section paper for the con- 
struction of a triliteral frequency distribution in the form of a distri- 
bution showing crests and troughs, such as that in Figure l4. In that 
figure the prefix to each letter to be recorded is inserted in the left 
half of the cell directly above the cipher letter being recorded; the 
suffix to each letter is inserted in the right half of the cell directly 
above the letter being recorded; and in each case the prefix and the suf- 
fix to the letter being recorded occupy the same cell, the prefix being 
directly to the left of the suffix. The number in parentheses gives the 
total frequency for each letter. 



It is felt advisable here to distinguish between two closely related 
terms. A triliteral distribution of A B C D E F would consider the 
groups A B C, B C D, C D E, D E F; a trigraphic distribution would con- 
sider only the trigraphs ABC and D E F. (See also subpar. 23d.) 



RESTRICTED 



84 



CONDENSED TABLE OF REPETITIONS 





Digraphs 




Trigraphs 


Longer Polygraphs 


DZ-9 


TZ-5 


-VF-4 


DZY-4 


FHT-3* 


HTZAITYDZY-2 


ZD-9 


TY-5 


VT— 4 


HTZ-4 


TYD-3 


BDVFHTZDF— 2 


HT— 8 


FH— 4 


ZF— 4 


ITY-4 


YDZ-3 


ZAITYDZY— 3 


ZY-6 


GH-4 


ZT— 4 


' ZDF-4 


ZAI-3 ’ 


FHTZ— 3 


DF— 5 


IT-4 


ZZ-4 


AIT-3 






GZ-5 








W 


■ 



DU 
ZZ 
FH 
ZF 
VS 
DK 
VH 
DM 
EV 
DX 
VH 
YZ 
W 
DG 
TU 
PH 
VA ZG 
DG ZI 
TF SD 



AX 

EH 

WH 

PD 

TU GT 
ZH GX 
DZ GU 
YA KI 
LZ FT 
YA HT UD 
SZ TH DX 
MZ FT HT 
BI MT AT 
TP TL XS 
TA FT AT 
FY VT OY 
SV VT GD ZS 



GD HZ TD FZ TF SD OH GL FO 

ABCDEFGHI 

(8) (4) O) (23) (3) 08) 08) 00 00) 



HV 
ZG 
IY 
ZK 
IY 
HZ 
V Y 
HC 
DH 
HZ 
IY 
HZ 
AR ZH 
YD VE 
RV VX 
FL HZ 
IG VZ 



SG 








UG 






JX 


PV 


FI 


FH 


LV 








GT 






XB 


ZG 


RZ 


JF 


HL 






DZ 


UL 






DG 


IY 


GP 


YJ 


PV 


FH 




XI 


SF 




SU 


YP 


HG 


HZ 


LD 


HP 


VG 




IG 


LZ 




ZS 


-F 


HF 


FP 


GH 


L 


M 


N 


0 


P 


Q 


R 


S 


T 


U 


V 


(*) 


(2) 


(0) 


(3) 


(5) 


(0) 


CO 


OO) 


(22) 


00 


OS) 



UD 
FT 
UF 
DG 
■ YY 
ZT 
GZ 
DY 
TA 
OF 
YD 
DR 
GD 
GY 
ZJ 
DZ 
KD 
TD 
DY 
TA 
XD 
ZS ZT 
TZ GZ 
ZG DY 
TD TD 
TZ TB 
ZG JT 
X- ZB FJ 
GX TD DY 
HA IV ZA 
IW ZV DZ 
SI ZF BD 
VZ TD GD 
TO GV PF 

XG FS PS DF 

W X Y Z 

0) (0 (14) (35) 



JtQVXX It 



S689SV : ai 




REF ID: A5 68 95 



RESTRICTED 



f . The trillteral frequency distribution is now to he examined with 
a view to ascertaining what digraphs and trigraphs occur two or more 
times in the cryptogram. Consider the pair of columns containing the 
prefixes and suffixes to D c in the distribution, as shown in Fig. l4. 

This pair of columns shows that the following digraphs appear in the 
cryptogram: 



Digraphs based on prefixes 
(arranged as one reads up 
the column) 

FD, ZD, 2D, VD, AD, YD, BD, 
ZD, ID, ZD, YD, BD, ZD, ZD, 
ZD, CD, ZD, YD, VD, SD, CD, 
ZD, ID 



Digraphs based on suffixes 
(arranged as one reads up 
the column) 

DZ, DY, D3, DF, DZ, DZ, DV, 
DF, DZ, DF, DZ, DV, DF, DZ, 
DT, DZ, DO, DZ, DG, DZ, DI, 
DF, DE 



The nature of the triliteral frequency distribution is such that in find- 
ing what digraphs are present in the cryptogram it is immaterial whether 
the prefixes or the suffixes to the cipher letters are studied, so long 
as one is consistent in the study . For example, in the foregoing list of 
digraphs based on the prefixes to D c , the digraphs FD, ZD, ZD, VD, etc., 
are found; if now, the student will refer to the suffixes of F c , Z c , V c , 
etc., he will find the very same digraphs indicated. This being the case, 
the question may be raised as to what value there is in listing both the 
prefixes and the suffixes to the cipher letters. The answer is that by 
so doing the trigraphs are indicated at the same time. For example, in 
the case of D c , the following trigraphs are indicated: 



FDZ, ZDY, ZDS, VDF, ADZ, YDZ, BDV, ZDF, 3DZ, ZDF, YDZ, BDV, ZDF, 
ZDZ, ZDT, CDZ, ZDO, YDZ, VDG, SDZ, GDI, ZDF,' IDE. 



g. The repeated digraphs and trigraphs can now be found quite read- 
ily. Thus, in the case of D c , examining the list of digraphs based on 
suffixes, the following repetitions are noted: 



DZ appears 9 times; DF appears 5 times; DV appears 2 times 

Examining the trigraphs with D c as central letter, the following repeti- 
tions are noted: 

ZDF appears 4 times; YDZ appears 3 times; BDV appears 2 times 

h. It is unnecessary, of course, to go through the detailed proce- 
dure set forth in the preceding subparagraphs in order to find all the 
repeated digraphs and trigraphs . The repeated trigraphs with D c as cen- 
tral letter can be found merely from an inspection of the prefixes and 
suffixes opposite D c in the distribution. It is necessary only to find 
those cases In which two or more prefixes are identical at the same time 
that the suffixes are identical. For example, the distribution shows at 
once that in four cases the prefix to D c is Z c at -the same time that the 
suffix to this letter is F c . Hence, the trigraph ZDF appears four times. 
The repeated trigraphs may all be found in this manner. 



RESTRICTED 



86 



REF ID: A56895 



RED TRIG TED 

i. The most frequently repeated digraphs and trigraphs are then 
assembled in what is termed a condensed table of repetitions , so as to 
bring this information prominently before the eye. As a rule, in mes- 
sages of average length, digraphs which occur less than four or five 
times, and trigraphs which occur less than three or four times may be 
omitted from the condensed table as being relatively of no importance in 
the study of repetitions. In the condensed table the frequencies of the 
individual letters forming the most important digraphs, trigraphs, etc,, 
should be indicated, 

44, Classifying the cipher letters into vowels and consonants .— 
a. Before proceeding to a detailed analysis of the repeated .digraphs and 
trigraphs, a very important step can be taken which will be of assistance 
not only in the analysis of the repetitions but also in the final solu- 
tion of the cryptogram. This step concerns the classification of the 
high-frequency cipher letters into two groups — (l) those which most prob- 
ably represent vowels, and (2) those which most probably represent con- 
sonants. For if the cryptanalyst can quickly ascertain the equivalents' 
of the four vowels, A, E, I, and 0, and of only the four consonants, R, 

R, S, and T, he will then have the values of approximately two-thirds of 
all the cipher letters that occur in the cryptogram.; the values of the 
remaining letters can almost be filled in automatically. 

b. The basis for the classification will be found to rest upon a 
comparatively simple phenomenon: the as6ociational or combinatory be- 

havior of vowels is, in general, quite different from that of consonants. 
If an examination be made of Table 7-B in Appendix 2, showing the rela- 
tive order of frequency of the 18 digraphs composing 25 percent of Eng- 
lish telegraphic text, it will be seen that the letter E enters into the 
composition of 9 of the 18 digraphs; that is, in exactly half of all the 
cases the letter E is one of the two letters forming the digraph. The 
digraphs containing E are as follows: 

ED ER ER ES 

HE RE SE TE VE 

The remaining nine digraphs are as follows: 

A T T HD OR ST 

IN NT TH 

OR TO 

t 

£. Rone of the 18 digraphs is a combination of vowels . Rote now 
that of the 9 combinations with E, 7 are with the consonants R, R, S, and 
T, one is with D, one is with V, and none is with any vowel . In other 
words, Ep combines most readily with consonants but not with other vowels, 
or even with itself. Using the terms often employed in the chemical ana- 
logy, E shows a great "affinity" for the consonants R, R, S, T, but not 
for the vowels. Therefore, if the letters of highest frequency occurring 
in a given cryptogram are listed, together with the number of times each 
of them combines with the assumed cipher equivalent of Ep> those which 
show considerable combining power or affinity for the cipher equivalent 



I 




87 



REF ID: A5 68 95 



RESTRICTED 

of Ep may "be assumed to tie the cipher equivalents of N, R, S, Tpj those 
which do not show any affinity for the cipher equivalent of Ep may he as- 
sumed to he the cipher equivalents of A, I, 0, Up, Applying these prin- 
ciples to the problem in hand, and examining the triliteral frequency 
distribution, it is quite certain that Z<;=Ep, not only because Z c is the 
letter of highest frequency, but also because it combines with several 
other high-frequency letters, such as D c , »Cf G c> etc. The nine letters 
of next highest frequency are: 

23 22 19 19 16 15 14 10 10 
DTFGVHYSI 

Let the combinations these letters form with Z c be indicated in the fol- 
lowing manner: 

Number of times Z c =. 
occurs as prefix — s 

Cipher Letter D(23) T(22) F(l9) G(l9) V(l6) H(l5) Y(l4) S(l0) 1(10) 

Number of times Z c pf 0 — % *” 

occurs as suffix — S 

d. Consider D c , It occurs 23 times in the message and l8 of those 
times"~it is combined with Z c , 9 times In the form Z C D C (=E9p) , and 9 times 
in the form DcZc (=9Ep) . It is clear that D c must be a consonant. In 
the same way, consider T c , which shows 9 combinations with Z c , 4 in the 
form ZcTc (=E0p) and 5 in the form T C Z C (=©Ep) . The letter T c appears to 
represent a consonant, as do also the letters F c , G c , and Y c , On the 
other hand, consider V c , occurring in all l6 times but never in combina- 
tion with Z c j it appears to represent a vowel, as do also the letters He, 
S c , and I c « So far, then, the following classification would seem logical: 

Vowels Consonants 

M=Ep), V c , H c , S c> I c D c , T c , F c , G c , Y c 

Further analysis of the letters representing vowels and conso - 
nants . — a. Op is usually the vowel of second highest frequency. Is it 
possible to determine which of the letters V, H, S, I c is the cipher 
equivalent of Op? Let reference be made again to Table 6 in Appendix 2, 
where it is seen that the 10 most frequently occurring diphthongs are: 

Diphthong 10 OU EA El AI IE AU EO AY UE 

Frequency 4l 37 35 27 17 13 13 12 12 11 

If V, II, S, I c are really the cipher equivalents of A, I, 0, Up (not 
respectively), perhaps it is possible to determine which is which by 
examining the combinations they make among themselves and with Z c T=Ep) • 
Let the combinations of V, H, S, I, and Z that occur in the message be 
listed. There are only the following: 

ZZ c -Jj VHc — 2 HH C — 1 HI C — 1 IS C — 1 SV C — 1 

ZZ C is of course EE^ . Note the doublet HH C ; if H c is a vowel, then the 
chances are excellent that II c =0p because the doublets AA V) Up, UUp, are 
practically non-existent, whereas the double vowel combination 00p is of 



RESTRICTED 



88 



REF ID : A56895 



HEOTIUCTEB - 

next highest frequency to the double vowel combination EEp. If H c =Op, 
then Vc must "be Ip because the digraph VH C occurring two times in the 
message could hardly be A0 p , or UOp, whereag the dipthong IOp is the one 
of high frequency in English. So far then, the tentative (because so far 
unverified) results of the analysis are as follows: 

Zc»sEp H c sOp V c =I p 

This leaves only two letters, I c and S c (already classified as vowels) to 
be separated into A p and Up. Note the digraphs: 

nic=oe p is c :ee p sv c =ei p 

Only two alternatives are open: 

(1) Either I c =Ap and S c =U p , 

(2) Or I c =U p and S^cAp# 

If the first alternative is selected, then 

HI c =0A p IS c =AU p SV c =UI p 

If the second alternative is selected, then 

HI c =OU p IS c =UAp SV c =AIp 

The eye finds it difficult to choose between these alternatives; but sup- 
pose the frequency values of the plaintext diphthongs as given in Table 6 
of Appendix 2 are added for each of these alternatives, giving the follow- 
ing: 

HI c sOAp, frequency value: 7 
SV c =UIt,, frequency values 5 
IS c =AUp, frequency value =13 



Total 25 

Mathematically, the second alternative appears to be more probable than 
the first .7 Let it be assumed to be correct and the following (still 
tentative) values are now at hand: 

Z c :E p II c =O p V c =l p S c =A p I c =U p 

b. Attention is now directed to the letters classified as conso- 
nants: How far is it possible to ascertain their values? The letter D c , 

from considerations of frequency alone, would seem to be Tp, but its 
frequency, 23, is not considerably greater than that for T c . _It is not 



7 A more accurate guide for choosing between the alternative groups 
of digraphs could be obtained through a consideration of the . logarithmic 
weights of their assigned probabilities, rather than their plaintext ” 
frequency values . These weights are given in Appendix 2, along with an 
explanation of the method for their derivation; a detailed treatment of 
their application is presented in Military Cryptanalysis, Part II. 



HI c :OUp, frequency value =37 
SV c =A3p, frequency value =17 
IS c =UA p , frequency values 5 



Total 59 



89 



REF ID: A5 68 95 



RESTRICTED 

much greater than bhat tor F c or S c , yith a frequency of 19 each. But 
perhaps it is possible to ascertain not the value of one letter alone hut 
of two letters at one stroke. To do this one may make use of a tetra- 
graph of considerable importance in English, viz ., TIOHp . For if the 
analysis pertaining to the vowels is correct, and if VHc=IOp, then an 
examination of the letters immediately before and after the (digraph VH C 
in the cipher text might disclose both Tp and Np. Reference to the text 
gives the following: 

GVUT 0 FVIEDq 

' eioe p eio©p 

The letter T c follows VH C in both cases and very probably indicates that 
®c=Npi "but as to whether G c or F c equals Tp cannot be decided. However, 
two conclusions are clear: first, the letter D c is neither Tp nor rip, 

from which it follows that it must be either Rp or Spj second, the let- 
ters Gc and F c must be either Tp and Sp, respectively, or Sp and Tp, 
respectively, because the only tetragraphs usually found (in English) 
containing the diphthong IOp as central letters are SIONp and TIOHp. 

This in turn means that- as regards D c , the latter cannot be either Rp or 
Spj it must be Rp, a conclusion which is corroborated by the fact that 
ZD C (=ERp)' and DZc (=REp) occur 9 times each. Thus far, then, the iden- 
tifications, when inserted in an enciphering alphabet, are 'as follows: 

Plain ABCDEFGHIJKLMNOPQRSTUVWXYZ 

Cipher S Z V TH DGFI 

F G 

46, Substituting deduced values in the cryptogram . — a. Thus far the 
analysis has been almost purely hypothetical, for as yet not a single one 
of the values deduced from the foregoing analysis has been tried out in 
the cryptogram. It is high time that this be done, because the final 
test of the validity of the hypotheses, assumptions, and identifications 
made in any cryptographic study is, after all, only this: do these hy- 

potheses, assumptions, and identifications ultimately yield verifiable, 
intelligible plain text when consistently applied to the cipher text? 

b. At the present stage in the process, since there are at hand the 
assumed values of bub 9 out of the 25 letters that appeal’, it is obvious 
that a continuous ’'reading'* of the cryptogram can certainly not be expect- 
ed from a mere insertion of the values of the 9 letters. However, the 
substitution of these values should do two things. First, it should 
immediately disclose the fragments, outlines, or "skeletons" of "good" 
words in the textj and second, it should disclose no places in the text 
where "impossible" sequences of letters are established. By the first 
is meant that the partially deciphered text should show the outlines or 
skeletons of words such as may be expected to be found in the communi- 
pationj this will become quite clear in the next subparagraph. By the 
second is meant that sequences, such as "AOOEN" or "TKRSEEO" or the like, 
obviously not possible or. extremely unusual in normal English text, must 
not result from the substitution of the tentative identifications result- 
ing from the analysis. The appearance of several such extremely unusual 
or impossible sequences would at once signify that one or more of the as- 
sumed values is incorrect. 



RESTRICTED 



90 



REF ID: A5 68 95 




c. Here are the results of substituting the nine values which have 
been deduced by the reasoning based on a classification of the high- 
frequency letters into vowels and consonants and the study of the members 
of the two groups: 



1 2 3 4 5 S 7 8 0 10 11 12 13 14 If 1C 17 18 19 20 21 22 23 24 25 

10 1C 23 35 19 10 3 19 15 5 6 35 19 19 35 23 14 10 5 19 15 4 35 23 10 

A SFLZFIOGHLPZFGZDYSPFHBZDS 

ATRET SO ETSER A TO ERA 
S S T ST S 

19 10 15 22 19 5 S 5 10 23 10 10 14 18 3 18 19 10 15 22 19 8 23 35 35 

B GVHTFUPLVDFGYVJVFVHTGADZZ 

SIO'NT IRTS I ITIONS REE 

T S ST ST 

8 10 22 14 23 35 14 19 35 3 35 22 19 5 22 10 22 35 4 23 10 19 13 22 85 

C AITYDZYFZJZTGPTVTZBDVFHTZ 

N RE TE ENS NINE RITONE 
ST S 

23 19 3 10 4 19 10 23 33 14 10 22 8 3 10 14 10 22 3 19 10 2 19 36 35 

D DFXSBGIDZYVTXOIYVTEFVMGZZ 

RT A S RE IN IN TI SEE 

ST ST 

22 15 5 5 16 8 35 23 19 2 16 22 35 8 10 22 14 23 35 14 4 23 16 19 15 

E thlLvxzdfmhtzaitydzybdvfh 

NO I ERT ONE - N RE RITO 
S S 

22 35 23 19 2 36 23 36 ft 8 10 8 10 10 10 36 14 10 8 16 10 10 6 10 35 

F tzdfkzdzzjsxisgzygavfslgz 

nert eree a ase S ITA SE 
S T T S T 

23 22 15 15 22 1 23 35 2 19 10 22 14 35 23 3 35 19 19 15 22 35 8 10 22 

G DTHHTCDZRSVTYZDOZFFHTZAIT 

RNOON RE AIN ER ETTONE N 

S S 

24 23 35 14 19 8 15 23 19 35 35 22 2 16 10 22 14 35 14 10 23 35 19 16 5 

H YDZYGAVDGZZTKHITYZYSDZGHU 

RE S IRSEEN 0 N E ARESO 
T T T 

35 19 35 22 19 5 5 10 23 10 8 1 24 16 8 8 10 2 6 36 23 19 6 10 23 

J ZFZTGUPGDIXWGHXASRUZDFUID 

ETENS SR SO A ERT R 

S T T T S 

3 19 15 22 IS 3 8 19 8 8 

K EGHTVEAGXX 

S 0 N I ’ S 
T T 



91 



REF ID: A5 68 95 



RESTRICTE D 



d. No impossible sequences are brought to light, and, moreover, 
several long words, nearly complete, stand out in the text. Note the 
following portions : A21 

HBZDSGVHTP 

(1) 0?ERASI0NT 

T S 

CIS 

TVTZBDVPHTZDF 

(2) NINE7RIT0NERT 

S S 

F22 

SLGZDTHHT 

(3) A7SERN00N 

T 



The words are obviously OPERATIONS, NINE PRISONERS, and AFTERNOON. The 
value G c is clearly Tpj that of F c is Spj and the following additional 
values are certain: 



Bc=Pp L c =Fp 



47, Completing the solution . — a. Each time an additional value is 
obtained, substitution is at once made throughout the cryptogram. This 
leads to the determination of further values, in an ever-widening circle, 
until all the identifications are firmly and finally established, and 
the message is completely solved. In this case the decipherment is as 
follows : 

1 2 3 4 S 0 7 8 9 10 11 12 13 14 16 10 17 18 IS 20 21 22 23 24 25 



A 

B 

c 

D 

E 

F 

G 

II 

J 

K 



SFDZFIOGHLPZF 

ASRESULTOFYES 

GVHTFUPLVDFGY 

TIONSBYFIRSTD 

AITYDZYFZJZTG 

HUNDREDSEVENT 

DFXSBGIDZYVTX 

RSCAPTHREDINC 

THLLVXZDFMHTZ 

N0FFICERSX0NE 

TZDFKZDZZJSXI 

NERSWEREEVACU 

DTHHTCDZRSVTY 

RNOONQREMAIND 

YDZYGAVDGZZTK 

DREDTHIRTEENW 

ZFZTGUPGDIXWG 

ESENTBYTRUCKT 

EGHTVEAGXX 

GT0N1GHTXX 



GZDYSPFHBZDS 

TERDAYSOPERA 

VJVFVHTGADZZ 

IVISIONTHREE 

PTVTZBDVFHTZ 

YNINEPRISONE 

OIYVTEFVMGZZ 

LUDINGSIXTEE 

AITYDZYBDVFH 

HUNDREDPRISO 

SGZYGAVFSLGZ 

ATEDTHISAFTE 

ZDOZFFHTZAIT 

ERLESSONEHUN 

HITYZYSDZGHU 

0UNDEDARET0B 

HXASRUZDFUID 

0CHAMBERS3UR 



92 



RESTRICTED 



REF ID : A56895 



Message: AS RESULT OF YESTERDAYS OPERATIONS BY FIRST DIVISION THREE 

HUNDRED SEVENTY NIKE PRISONERS CAPTURED INCLUDING SIXTEEN OFFICERS ONE 
HUNDRED PRISONERS WERE EVACUATED THIS AFTERNOON REMAINDER LESS ONE HUN- 
DRED THIRTEEN WOUNDED ARE TO BE SENT BY TRUCK TO CITAKBERSBURG TONIGHT 

T), The solution should, as a rule, not "be considered complete until 
an attempt has "been made to discover all the elements underlying the gen- 
eral system and the specific key to a message. In this case, there is no 
need to delve further into the general system, for it is merely one of 
uniliteral substitution with a mixed cipher alphabet. It is necessary 
or advisable, however, to reconstruct the c5.pher alphabet, because this 
may give clues that later may become valuable * 

£, Cipher alphabets should, as a rule, be reconstructed by the 
cryptanalyst in the form of enciphering alphabets because they will then 
usually be in the form in which the encipherer used them. This is impor- 
tant for two reasons. First, if the sequence in the cipher component 
gives evidence of system in its construction or if it yields clues point- 
ing toward its derivation from a key word or a key phrase, this may often 
corroborate the identifications already made and may lead directly to 
additional identifications . A word or two of explanation is advisable 
here. For example, refer to the skeletonized enciphering alphabet given 
at the end of subpar. 4 5b: 



Plain ABCDEFGHIJKLMNOPQRSTUVWXYZ 

Cipher S Z V TH DGFI 

F G 



Suppose the cryptanalyst, looking at the sequence DGFI or DFGI in the 
cipher component, suspects the presence of a keyword-mixed alphabet. 

Then DFGI is certainly a more plausible sequence than DGFI. Examining 
the skeleton cipher component more carefully, he notes that S • . . Z 
would allow for insertion of three of the missing letters TJWXY, since the 
letters T and V occur later, probably in the keyword itself; further, he 
notes that the key word probably begins under Fp and ends in TH, making 
it probable that the TH is followed by AB or BC, This would mean that 
either P, Qp=A, B e or B, C c . Assuming that P, Qp=A, B c , he refers to the 
frequency distribution and finds that the assumptions Pp=A c and Qp=B c are 
not good; on the other hand, assuming that T, Qp=B, Cc, the frequency 
distribution gives excellent corroboration. A trial of these values 
would materially hasten solution because it is often the case in crypt- 
analysis that if the value of a very low-frequency letter can be surely 
established it will yield clues to other valp.es very quickly. Thus, 
if Qp is definitely identified it almost invariably will identify Up, and 
will give clues to the letter following the Up, since it must be a vowel . 
In the case under discussion the identification P, QprB, Cc would have 
turned out to be correct. For the foregoing reason an attempt should 
always be made in the early stages of the analysis to determine, if 
possible, the basis of construction or derivation of the cipher alphabet; 
as a rule this can be done only by means of the enciphering alphabet, and 



93 



RESTRICTED 



REF ID : A56895 



not the deciphering alphabet# For example, the skeletonized deciphering 
alphabet corresponding to the enciphering alphabet directly above is as 
follows : 



Cipher ABCDEFGHIJKLMNOPQRSTUVWXYZ 

Plain R T S 0 U AN I E 

S T 



Here no evidences of a keyword-mixed alphabet are seen at all. However, 
if the enciphering alphabet has been examined and shows no evidences of 
systematic construction, the deciphering alphabet should then be examined 
with this in view, because occasionally it is the deciphering alphabet 
which shows the presence of a key or keying element, or which has been 
systematically derived from a word or phrase. The second reason why it is 
important to try to discover the basis of construction or derivation of 
the cipher alphabet is that it affords clues to the general type of key 
words or keying elements employed by the enemy. This is a psychological 
factor, of course, and may be of assistance in subsequent studies of fyis 
traffic. It merely gives a clue to the general type of thinking indulged 
in by certain of his cryptographers . 

d. In the case of the foregoing solution, the complete enciphering 
alphabet is found to be as follows: 



Plain ABCDEFGHIJKLMNOPQRSTUVWXYZ 

Cipher SUXYELEAVNW ORTHBCDFGIJKMP 



Obviously, the letter Q, which is the only letter not appearing in the 
cryptogram, should follow P in the cipher component. Note now that the 
latter is based upon the keyword IEAVENWORTH, and that this particular 
cipher alphabet lias been composed by shifting the mixed sequence based 
upon this keyword five intervals to the right so that the key for the 
message is Ap=S c . Note also that the deciphering alphabet fails to give 
any evidence of keyword construction based upon the word LEAVENWORTH. 



Cipher ABCDEFGHIJKLMNOPQRSTUVWXYZ 

Plain HPQRGSTOUVWFXJLYZMANBIKCDE 



e. If neither the enciphering nor the deciphering alphabet exhibits 
characteristics which give indication of derivation from a key word hy 
some form of mixing or disarrangement, the use of such a key word for 
this purpose is nevertheless not finally excluded as a possibility. For 
the reconstruction of such mixed alphabets the cryptanalyst must use 
ingenuity and a knowledge of the more common methods of suppressing the 
appearance of key words in the mixed alphabets . Several of these methods 
are given detailed treatment in par. 51 below. 

f. It is very important in practical cryptanalytic work to pre- 
pare a technical summary of the solution of a system. Step-by-step 

® It is usual practice to employ as the specific key the equivalent 
of either A-n, or the equivalent of the first letter of the plain compo- 
nent when this component is a mixed sequence. 



RESTRICTED 



94 






REF ID: A56895 



commentaries should accompany an initial solution; the steps taken should 
he jotted down as they are made , and at the end they should he combined 
into a complete resume of the analysis. The r€sum€ should he brief and 
concise, yet comprehensive enough that at any future time the solution 
may he reconstructed following the exact manner in which it was origi- 
nally accomplished. Assumptions of words, etc,, should he referred to 
with work sheet line- and column- indicators, and should he couched in the 
proper cryptologic language or symbols, A short exposition of the mech- 
anics of the general system, enciphering alphabets, enciphering diagrams, 
etc,, as well as all key words (together with their derivation) and spe- 
cific keys should he included. On the work sheet there should be a 
letter-for-letter decryptment under the cipher text; the final plaintext 
version should he in word lengths, with any errors or garbles corrected. 
Hulls or indicators showing sentence separation, change of key, etc . , may 
he enclosed in parentheses. All work sheets and notes should he kept 
together with the solution. 

48, General remarks on the foregoing solution .— a. The example 
solved above is admittedly a more or less artificial illustration of the 
steps in analysis, made so in order to demonstrate general principles. 

It was easy to solve because the frequencies of the various cipher let- 
ters corresponded quite well with the normal or expected frequencies. 
However, all cryptograms of the same monoalphabet ical nature can he 
solved along the same general lines, after a certain amount of experi- 
mentation, depending upon the length of the cryptogram, and the skill 
and experience of the cryptanalyst .9 

h. It is no cause for discouragement if the N student 's initial 
attempts to solve a cryptogram of this type require much more time and 
effort than were apparently required in solving the foregoing purely 
illustrative example . It is indeed rarely the case that every assumption 
made by the cryptanalyst proves in the end to have been collect; more 
often it is the case that a good many of his initial assumptions are in- 
correct, and that he loses much time in casting out the erroneous ones. 
The speed and facility with which this elimination process is conducted 
is in many cases ‘all that distinguishes the expert from the novice. 



a 

The use of monoalphabetic substitution in modern military operations 
is exceedingly rare because of the simplicity of solution. However, such 
cases have occurred, and one rather illuminating instance may he cited. 

In an important communication on 5 August 1918, General Kress von 
Kressenstein used a single mixed alphabet, and the intercepted radio mes- 
sage was solved at American GHQ very speedily. A day later another mes- 
sage, but In a very much more difficult cipher system, was intercepted 
and solved. When translated, it read as follows: 

"GHQ Kress: 

The cipher prepared by General von Kress was at once solved here. 

Its further use and employment is forbidden. 

Chief Signal Officer, Berlin. 11 



RESTRICTED 



95 



RESTRICTED 



REF ID: A5 68 95 



c. Nor will tlae student always find that the initial classification 
into vowels and consonants can he accomplished as easily and quickly as 
was apparently the case in the illustrative example. The principles in- 
dicated are very general in their nature and applicability, and there are, 
in addition, some other principles that may he brought to hear in case of 
difficulty. Of these, perhaps the most useful are the following! 

(1) In normal English it is unusual to find more than two consonants 
in succession, each of high frequency. If in a cryptogram a succession 
of three or four letters of high-frequency appear in succession, it is 
practically certain that at' least one of these represents a vowel.-*-® 

(2) Successions of three vowels are rather unusual in English. 
Fractically the only time this happens is when a word ends in two vowels 
and the next word begins with a vowel. 

(3) When two letters already classified as vowel-equivalents are 
separated by a sequence of six or more letters, it is either the case 
that one of the supposed vowel-equivalents is incorrect, or else that 
one or more of the intermediate letters is a vowel -equivalent .-*-3 

(4) Reference to Table 7-B of Appendix 2 discloses the following! 

Distribution of first 18 digraphs forming 2? percent of English text 



Number of consonant-consonant digraphs — ----------------- 4 

Number of consonant-vowel digraphs — . — - 6 

Number of vowel-consonant digraphs- — — — — — — 8 

Number of vowel-vowel digraphs - 0 

Distribution of first 53 digraphs forming j?0 percent of English text 

Number of consonant-consonant digraphs ‘ — ' 8 

Number of consonant-vowel digraphs—————————— 23 

Number of vowel -consonant digraphs— — 18 

Number of vowel-vowel digraphs— ————————————— 4 



-*-® Sequences of seven consonants are not impossible, however, as in 
STR ENGTH THRO UGH. 

•*•-*- Note that the word RA DIOED , past tense of the verb RADIO, is coming 
into usage. 

A sequence of seven vowels is not impossible, however, as in THE 
WAY YOU EARN. 

13 

Some cryptanalysts place a good deal of emphasis upon this principle as a method of locating the remaining 
vowels after the first two or three have been located. They recommend that the latter be underlined throughout 
the text and then all sequences of five or more letters showing no underlines be studied attentively. Certain 
letters which occur in several such sequences are sure to bo vowels. An arithmetical aid in the study is as follows: 
Take a letter thought to be a good possibility os the cipher equivalent of a vowel (hereafter termed a possible 
vowel-equivalent) and find the length of each interval from the possible vowel-equivalent to the next known (fairly 
surely determined) vowel-equivalent. Multiply the interval by the number of times this interval is found. Add 
the products and divide by the total number of intervals considered. This will give the mean interval for that 
possible vowel-equivalent. Do the same for all the other possible vowel-equivalents. The one for which the 
mean is the greatest is most probably a vowel-equivalent. Underline this letter throughout the text and repeat 
the process for locating additional vowel-equivalents, if any remain to be located. 



RESTRICTED 



96 



REF ID: A5 68 95 



RESTRICTED 

The latter tabulation shows that of the first 53 digraphs which form 50 
percent of English text, 4l of them, that is, over 75 percent, are com- 
binations of a vowel with a consonant. In short. In normal English the 
vpwels and the high-frequency consonants are in the long run distributed 
fairly evenly and regularly throughout the text. 

(5) As a rule, repetitions of trigraphs in the cipher text are com- 
posed of high-frequency letters forming high-frequency combinations. The 
latter practically always* contain at least one vowel; in fact, if refer- 
ence is made to Table 10-A of Appendix 2 it will be noted that 36 of the 
56 trigraphs having a frequency of 100 or more contain one vowel, 17 of 
them conbain two vowels, and only three of them contain no vowel. In the 
case of tetragraph repetitions, Table 11-A of Appendix 2 shows that no 
tetragraph listed therein fails to contain at least ‘one vowel; 27 of them 
contain one vowel, 25 contain two vowels, and 2 contain three vowels* 

(6) 'Quite frequently when two known vowel-equivalents are separated 
by six or more letters none of which seems to be of sufficiently high 
frequency to represent one of the vowels A E I 0, the chances are good 
that the cipher-equivalent of the vowel U or Y is present. 

d. To recapitulate the general principles, vowels may then be dis- 
tinguished from consonants in that they are usually represented bys 

(1) high-frequency letters; 

(2) high-frequency letters which do not readily contact each other; 

9 • 1 ^ ’ 

(3) high-frequency letters which have a great variety of contact; 

(4) high-frequency letters which have an affinity for low-froquency 
letters (i.e., low-frequency plaintext consonants) . 

e. In the foregoing example the amount of experimentation or “cut- 
ting and fitting" was practically nil, (This is not true <?f real cases 
as a rule.) Where such experimentation is necessary, the underscoring of 
all repetitions of several letters is very essential, as it calls attent- 
ion to peculiarities of structure that often yield clues. 

f . After a few basic assumptions of values have been made, if short 
words or skeletons of words do not become manifest, it is necessary to 
make further assumptions for unidentified letters. This is accomplished 
most often by assuming a word.}**' Now there are two places in every mes- 
sage which lend themselves more readily to successful attack by the assump- 
tion of words than do any other places — the very beginning and the very 

, end of the message. The reason is quite obvious, for although words may 
begin or end with almost any letter of the alphabet," they usually begin 

This process does not involve anything more mysterious than ordinary, logical reasoning,* there is nothing 
of the subnormal or supernormal about it. If cryptanalytic success seems to require processes akin to those of 
, medieval magic, if “hocus-pocus’ 9 is much to the fore, the student should begin to look for items that the claimant 
• of such success has carefully hidden from yiew, for the mystification of the uninitiated. If the student were to 
adopt as his personal motto for all his cryptanalytic ventures the quotation (from Tennyson’s poem Columbus) 
appearing on the back of the title page of this text, he will frequently find “short cuts” to his destination and wiif 
not too often be led astrayl 



t 



• RESTRICTED 



97 



HEOTIUCTE B- 



REF ID: A5 68 95 



and end with hut ft few very common digraphs pjp$ trigraphs . Very often 
the association of letters in peculiar combinations will enable the stud- 
ent to note where one word ends and the next begins. For example suppose, 

E, If, S, ancL T have been definitely identified, and a sequence like the 
following Is found in a cryptograms 

' • • i E KT 8 HE . • • 

Obviously the break between, two words should fall either after the S of > 

E H T S or after the T of E If T, so that two possibilities are offered: 

. . .EHTS/EE . . ., or. . .ENT/SNE. ; .. Since in 

English there are very few words with the initial trigraph S N E, it is » 

most likely that the proper division is •••ENTS/HE.... Of 

course, when several word divisions have .been found, the solution is 

more readily achieved because of the greater ease with which assumptions 

of additional new values may be made. 

g. Although a considerable amount of detailed treatment has been 
devoted to vowel-consonant analysis, it is felt advisable again to caution 
the student against the natural tendency to accept without question the 
results of any one cryptanalytic technique exclusively, even one such as 
vowel -consonant analysis which seems quite scientific in character. 

^9. The probable-word 11 method; its value and applicability .— a. In 
practically all cryptanalytic studies, short cuts can often be made by 
assuming the presence of certain words in the message under study. Some 
writers attach so much value to this kind of an "attack from the rear" 
that they practically elevate it to the position of a method and call it 
the "intuitive method" or the "probable-word method." It is, of course, 
merely a refinement of what in everyday language is called "assuming" or 
"guessing" a word in the message. The value of making a "good guess" can 
hardly be overestimated, and the cryptanalyst should never feel that he 
is accomplishing a solution by an illegitimate subterfuge when he has 
made a fortunate guess leading to solution. A correct assumption a3 to 
plain text will often save hours or days of labor, and sometimes there 
is no alternative but to try to "guess a word", for occasionally a system 
is encountered the solution of which is absolutely dependent upon this 
artifice . 

b. The expression "good guess" is used advisedly. For it is "good" 
in two respects. First, the cryptanalyst must use care in making his 
assumptions as to plaintext words . In this he must be guided by extra- * 

neous circumstances leading to the assumption of probable words — not just 
any words that come to his mind. Therefore he must use Tais imagination 
but he must nevertheless carefully control it by the exercise of good 
judgement. Second, only if the "guess" is correct and leads to solution, 
or at least puts him on the road to solution, it is a good guess. But, 
while realizing the usefulness and the time and labor-saving features of 
a solution by assuming 'a probable word, the cryptanalyst should exercise 
discretion in regard to how long he may continue in his efforts with this 
method. Sometimes he may actually waste. time by adhering to the method 
too long, if straightforward, methodical analysis trill yield results wore 
quickly. 



98 



REF ID : A56895 



RESTRICTED 

£. Obviously, the "probable-word" method has much more applicability 
when working upon material, the general nature of which is known, than when 
working upon moi'e or loss isolated communications exchanged between corres- 
pondents concerning whom or whose activities nothing is known. For in the 
latter case there is little or nothing that the imagination can seize upon 
as a background or bos is for the assumptions nowever, in the case of 
military cryptanalysis in time of aotivo operations there is, indeed, so 
great a probability that certain words and expressions are present in cer- 
tain cryptograms that those words and expressions ("cliches") are often 
referred to as "cribs" (as defined in Webster’s New Collegiate Diction- 
ary: "...a plagiarism; hence, a translation, etc., to aid a student in 

reciting."). The cryptanalyst is quite sure they are present in the 
cryptogram under examination— what he must do is to "fit" the crib to 
the text", that is, locate it in the cipher text. 

d. Very frequently, the choice of probable words is aided or limit- 
ed by" the number and positions of repeated letters * These repetitions 
may be patent — that is, externally visible in the cryptographic text as 
it originally stands— or they may be latent '— that is, externally invis- 
ible but susceptible of being made patent as a result of the analysis. 

For example, in a monoalphabetle substitution cipher, such as that dis- 
cussed in the preceding paragraph, the repeated letters are directly 
exhibited in the cryptogram; later the student will encounter many cases 
in which the repetitions are latent, but are made patent by the analyt- 
ical process. When the repetitions are patent, then the pattern or for - 
mula to which the repeated letters conform is of direct use in assuming 
plaintext words; and when the text is in word-lengths, the pattern is 
obviously of even greater assistance. Suppose the cryptanalyst is deal- 
ing with military text, in which case he may expect such words as DIVIS- 
ION, BATTALION, etc., to be present in the text. The positions of the 
repeated letter I in DIVISION, of the reversible digraph AT, TA in BAT- 
TALION, and so on, constitute for the experienced cryptanalyst tell-tale 
indications of the presence of these words, even when the text is not 
divided up into its original word lengths. 

e. The important aid that a study of word patterns can afford in 
cryptanalysis warrants the use of definite terminology and the establish- 
ment of certain data having a bearing thereon. The phenomenon herein 
under discussion, namely, that many words are of such construction as 
regards the number and positions of repeated letters as to make them 
readily identifiable, will be termed idiomorphism (from the Greek ,, idios"» 
one’s own, individual, peculiar 4 * "morphe" =form) . Words which show this 
phenomenon will be termed idiomorphic . It will be useful to deal with 
the idiomorphlsms symbolically and systematically as described below. 



15 .. 

’ .General GIvierge In bis Court de Cryplographie (p. 121) says: “However, expert cryptanalysts often 
employ such details as are cited above [in connection with assuming the presence of ‘probable words’], and tho 
experience of tho years 1014 to 1918, to cite only those, prove that in practice one often has at his disposal ele- 
ments of this nature, permitting assumptions much more audacious than those which served for the analysis 
of the last example. The reader would therefore be wrong in imagining that such fortuitous dements are 
encountered only in cryptographic works where the author deciphers a document that ho himself enciphered. 
Cryptographic correspondence, if it is extensive, and if sufficiently numerous working data are at hand, often 
furnishes elements so complete that an author would not dare use all of them in solving a problem for fear of 
being accused of obvious exaggeration.” 



RESTRICTED 



99 



REF ID: A5 68 95 



RESTRICTE D 



f . When dealing with cryptograms in which the word lengths are 
determined or specifically shown, it is convenient to indicate their 
lengths and their repeated letters in some easily recognized manner or 
hy formulas , This is exemplified, in the ease of the word DIVISION, hy 
the formula ABCBDBEF; in the case of the word BATTALION, hy the formula 
ABCCBDEFG, If the cryptanalyst, during the course of his studies, makes 
note of striking formulas he has encountered, with the words which fit 
them, after some time he will have assembled a quite valuable body of 
data* And after more or less complete iists of such formulas have been 
established in some systematic arrangement, a rapid comparison of the 
idiomorphs in a specific, cryptogram with those in his lists will be feas- 
ible end will often lead to the assumption of the current word* Such 
listB can be arranged according to word length, as shown herewith: 

3/aba : DID, EVE, EYE, etc, 
abb : ADD, ALL, ILL, OFF, etc* 

4/abac : ARAB, AWAY, etc. 

abbe : ALLY, BEEN, etc* 

abca : AREA, BOMB, DEAD, etc. 

abeb s ANON, CEDE, etc. 

etc . etc . 



g. When dealing with cryptographic text in which the lengths of the 
words are not indicated or otherwise determinable, lists of the foregoing 
nature are not so useful as lists in which the words (or ports of words) 
are arranged according to the intervals between identical letters, in the 
following manner: 



1 Interval 
-DiD- 
-EvE- 
-EyE- 
dlvlsion 
revision 
etc* 



2 Intervals 
AbbAcy 
ArAbiA 
AblAtive 
AboArd 
-AciA- 
etc. 



3 Intervals 
AbeyAnce 
hAbitAble 
lAborAtory 
AbreAst 
AbroAd 
etc . • 



Repeated digraphs 
COCOa * 
-dERER 
ICICle 
-ININg 
bAGgAGe 
etc. 



h. The most usual practice, however, in designating idiomorphic 
patterns and classifying them into systematic lists is to assign a lit- 
eral nomenclature to that portion of a word (or sequence of plaintext 
letters) which contains the distinctive pattern, beginning with the first 
letter which is repeated in the pattern and ending with the last letter 
which is repeated in the pattern. Thus, the word DIVISION would he term- 
ed as an idiomorph of the abaca class (based on the sequence 17131 con- 
tained therein), and t he wor d BATTALION as an idiomorph of the abba class 
(based on the sequence ATTA) * In Appendix 3 will he found a compendium 
of the more frequent military words in English, arranged according to 
word-lengths in alphabetical order and in rhyming order; in addition, 
there will he found in this appendix a listing of idiomorphs arranged 
first according to pattern and then according to the first letter of the 
idiomorphic sequence. 



RESTRICTED 



100 



REF ID: A5 68 95 



- REDTIUCTED 

50, Solution of additional cryptograms produced lay the same compon - 
ents «— -a. To return, after a rather long digression, to the cryptogram 
solved in pars, 44 - 47, once the components of a cipher alphabet have 
been reconstructed, subsequent messages which have been enciphered by 
means of the same components may be solved very readily, and without re** 
course to the principles of frequency, or application of the probable- 
word method. It has been seen that the illustrative cryptogram treated 
in paragraphs 4l - 47 was enciphered by Juxtaposing the cipher component 
against the normal sequence so that A p =S c , It is obvious that the cipher 
component may be set against the plain component at any one of 26 differ- 
ent points of coincidence, each yielding a different cipher alphabet. 
After the components have been reconstructed, however, they become 
known sequences and the method of converting the cipher letters into 
their plain-component equivalents and then completing the plain-component 
sequence^ begun by each equivalent can be applied to solve any crypto- 
gram which has been enciphered by these components • 

b. An example will serve to make the process clear. Suppose the 
following" message, passing between the same two stations as before, was 
intercepted shortly after the first message had been solved: 

IYEWK CEEHK OPOSE LFOOH EAZXX 

It is assumed that the same components were used, but with a different 
key letter. First the initial two groups are converted into their 
plain-component equivalents by setting the cipher component against the 
plain component at *any arbitrary point of coincidence. The initial let- 
ter of the former may as well be set against A of the latter, with the 
following result : 



Plain ABCDEFGHIJKLMNOPQRSTUVWXYZ 

Cipher LEAVNWORTHBCDFGIJKMPQSUXYZ 



Cryptogram IYEWK CERNW 

Equivalents— PYBFR LBHEF ... 

The plain component sequence initiated by each of these conversion equiv- 
alents is now completed, with the results shown in Fig. 15. Note the 
plaintext generatrix, CLOSEYOURS, which manifests itself without further 
analysis * The rest of the message may be read either by continuing the 
same process, or, what is even more simple, the key letter of the message 
pay now be determined quite readily and the message deciphered by its 
means. 

It must be noted that if the plain component is a mixed sequence^ 
then it is this mixed sequence which must be used to complete the 
columns , 



i 



- HEaTlUCTEP 



101 



REF ID: A5 68 95 



•R ESTRICTED 

IYEWKCERKW 

PYBFRLBHEF 

QZCGSMCIFG 

RADHTNDJGH 

SBEIUOEKHI 

TCFJVPFLIJ 

UDGKWQGMJK 

VEHLXRHNKL 

WFIMYSIOLM 

XGJNZTJPMN 

YHKOAUKQWO 

ZILPBVLROP 

AJMQCWMSPQ’ 

BKNRDXNTQR 
*C LOSEYOUR8 * 

■ DMPTFZPVSI 
ENQUGAQWTU 
FORVHBRXUV 
GPSWICSYVW 
HQTXJDTZWX 
IRUYKEUAXY 
JSVZLFVBYZ 
KTWAHGWCZA 
LUXBNHXDAB 
MVYCOIYEBC 
NWZDPJZFCD 
OXAEQKAGDE 

Figure 15. 

c t In order that the student may understand without question just 
what is involved in the latter step, that is, discovering the key letter 
after the first two or three groups have been, deciphered by the conver- 
sion-completion process, the foregoing example will be used. It was 
noted that the first cipher group was finally deciphered as follows t 

Cipher—- I Y E W K 

, Plain CLOSE 

Now set the cipher component against the normal sequence so that Cp=I c , 
Thus: 



Plain ABCDEFGHIJKLMNOPQRSTUVWXYZ 

Cipher FGIJKMPQSUXYZLEAVNWORTHBCD 



It is seen here that when Cp=I c then Ap=F c . This is the key for the en- 
tire message. The decipherment may be completed by direct reference to 
the cipher alphabet. Thus: 

Cipher— IYEWK CERNW OFOSE LFOOH EAZXX 

Plain CLOSE YOURS TATIO NATTW OPM XX 

Message: CLOSE YOUR STATION AT TWO PM 



nnnmnmmnrv 



102 



- restricted 



REF ID: A5 68 95 



d. . The student should make sure that he understands the fundamental 
principles involved in this quick solution, for they are among the most 
important principles in cryptanalytics * How useful they are will "become 
clear as he progresses into more and more complex cryptanalytic studies* 

e. It must be kept in mind that there are four ways v that two basic 
sequences maybe used to form a cipher alphabet, subject "to the instruc- 
tions guiding the cryptographer in- the use of his cryptosystem; this fact 
must be considered when additional cryptograms appear in a particular 
cryptosystem for which the primary components have been recovered* Assum- 
ing that the sequences just recovered are labelled "A” and "B" , then the 
following contingencies might arise in the encryption of subsequent mes- 
sages: 

(1) "A" direct for the plain component, and n B" direct for the 
cipher component (as in the original recovery); 

( 2 ) "A" direct for the plain, and "B” reversed for the cipher; 

(3) "B" direct for the plain, and "A" direct for the cipher; and 

(4) "B" direct for the plain, and "A” reversed for the cipher* 

51* Derivation of key words ,— a* Concurrent with the solution of a 

cryptogram, there should be a simultaneous effort in the reconstruction 
of cipher alphabets and recovery of key words * Much labor can thus be 
saved as recovery of the keys early in the stages of solution may trans- 
form the process of cryptanalysis into one of decipherment. 

b, A mixed cipher alphabet falls into one of five categories, 
according to the composition of its components, viz ., 

(1) the plain component is the normal sequence and the cipher com- 
ponent is mixed; 

(2) the cipher component is the normal sequence and the plain com- 
ponent is mixed; 

(3) both components are the same mixed sequence; 

(4) both components are the same mixed sequence, but running in 
reverse; or 

(5) the components are different mixed sequences. 

c, Let us examine several types of mixed sequences, using the key 
word HYDRAULIC as an example. The ordinary keyword-mixed sequence pro- 
duced from this key word is: 

(1) HYDRAULICBEFGJKMHQPQSTVWXZ 



itHOTRtCTED- 



103 



RESTRICTED 



REF ID: A5 68 95 



The two principal transposition-mixed types "based on this key word are 
derived from the diagram* 



1 Y D R A U L I C 

BEFGJKMKO ' . 

PQSTVWXZ and read* 

(2) HBPYEQDFSRGTAJVUKWL' MXINZCO and 

(3) AJVCODFSHBPINZLMXRGTUKWYEQ 

Other types may arise from variojis types of route transpositions such as 
the following, using the foregoing diagram: 



(4) 


H 


B 


P 


Q 


E 


Y 


D 


F 


S 


T 


G 


R 


A 


J 


V 


W 


K 


u 


L 


M 


X 


Z 


N 


I 


C 


0 


(5) 


H 


Y 


B 


P 


E 


D' 


R 


F 


Q 


S 


G 


A 


U 


J 


T 


V 


K 


L 


I 


M 


w 


X 


N 


C 


0 


z 


(6) 


P 


B 


Q 


H 


E 


S 


Y 


F 


T 


D 


G 


V 


R 


J 


W 


A 


K 


X 


u 


M 


z 


L 


N 


I 


0 


c 


(7) 


H 


Y 


D 


R 


A 


U 


L 


I 


C 


0 


U 


M 


K 


J 


G 


y 


E 


B 


p 


Q 


s 


T 


V 


w 


X 


z 


(8) 


0 


C 


I 


L 


U 


A 


R 


D 


Y 


H 


B 


P 


Q 


S 


T 


V 


W« 


X 


z 


N 


M 


K 


J 


G 


y 


E 


(9) 


H 


Y 


E 


B 


P 


Q 


S 


T 


G 


F 


D 


R 


A 


U 


K 


j 


y 


W 


X 


Z 


H 


M 


L 


I 


c 


0 


(10) 


C 


P 


I 


0 


Q 


B 


L 


N 


S 


E 


H 


U 


M 


z 


T 


y 


Y 


A 


K 


X 


V 


G 


J) 


R 


j 


w 



Any transposition system may "be employed to produce a systematically- 
mixed sequence; practicability of method is the only determining factor. 
It must "be remembered that the greatest amount of systematic mixing will 
produce a sequence inherently no more secure than a random-mixed alphabet, 

d. The student would do well to construct "both enciphering and de- 
ciphering versions of cipher alphabets recovered, as has "been previously 
mentioned. For example, in the following case 

Plain: JQNMFHLEBRSKGYZOTICDUVAWPX 

Cipher: ABCDEFGHIJKLMNOPQRSTUVWXYZ 

no semblance of a key is apparent; "but in the inverse form 

Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZ 

Cipher: WISTHEMFRALGDCPYBJKQUVXZNO 

the key-phrase "NOW IS THE TIME FOR ALL GOOD MEN TO COME TO THE AID OF 
THEIR PARTY" 1 b quite clear. In other types of mixed sequences, first 
the one form is attacked, and then if negative results are obtained the 
inverse form is treated. 

e. Let us consider the following cipher alphabet: 

P: ABCDEFGHIJKLMHOPQRSTUVWXYZ 

C: DWZMSOCRYATXBEFUGQHIVJKLNP 

The section V W X seems to comprise superimposed parts of the non-keyword 
J K L 

portions of mixed sequences. Adding Y Z to the plain component, we get 



REGTRICTEB 



104 



REF ID : A56895 



t 



* 



L 



1 



DESTIUOTEB- i 

V W X Y Z which is certainly consistent as far as alphabetical progres- 
J K L N P 

sion goes, and indicates that the letters M and 0 are present in the key 
word of the cipher component. Continuing in this vein, the section 
MNOQSTVWXYZis rapidly established by correlating both se- 
BEFGHIJKLNP 

quences • It is obvious that the plain component key word begins right 
after the Z, and that the cipher component key word probably just pre- 
cedes the B. Going to the right, Z R H suggests key words like RHOMBOID, 

P Q R • 

RHEUMATISM, etc. These trials are quickly repudiated } therefore we go on 
to Z R E which is acceptable. Z R E K is found wanting, but Z R E P is 
PQS PQST PQSU 

very satisfactory, and this is soon expanded toZREPUBLIC, and in 

PQSUVWXYZ 

a moment or two we recover the complete cipher alphabet: 

P: REPUBLICANDFGHJICMOQSTVWXYZ 

C: Q S U V W X Y Z D E M 0 C R A T B F G H I J K L N P 

f . In the example below the student will observe that the alphabets 

are reciprocal: this is an indication of identical sequences at a shift 

of 13, or that a mixed sequence running against itself in reverse has 
been employed. In this case the W X Y Z points to the latter hypothesis. 

Z Y X W 

P: ABCDE'FGHIJKLMNOPQRSTUVWXYZ 

C: HOJFTDHAKC IMLGBSUVPEQRZYXW 

Starting with the V W X Y Z R cluster, we see that the key word begins 

R Z Y X W V 

with the letter Rj therefore the next letter should be a vowel. Z R A 

W V H 

is not acceptable, but Z R E is fine, showing that the letter U appears 

W V T 

in the key word. Continuing the same line of reasoning as in the preced- 
ing example, and with a little further experimentation, the final alpha- 
bet is discovered to be 

P: REPUBLIC ANDPGHJKKOqSTVWXTZ 

C: VTSQOMKJHGFDNAC ILBUPERZYXW 

g. In the next example, all efforts to derive key words on the 

basis of keyword-mixed sequences are fruitless: the conclusion is there- 

fore drawn that this is a case of a transposition. 

P: ABCDEFGHIJKLMNOPQRSTUVWXYZ 

- C: ACSEJYIGWLFVMHXNKZPBQRDUTO 

Considering the mechanics of the cryptography involved, and assuming for 
the time being that Z is at the bottom of the matrix and not in the key 
word, ye start with the letters to the left, or if this fails, to the 
right' of Z in the cipher component, obtaining the column N which is not 
' K 

Z 

incompatible if N is in the key word on the top row. If we place Y to 




RE B TniCTEB - 



105 



RESTRICTED 



REF ID: A5 68 95 



the left of Z and huild up Its column, we get E N which is excellent# 

J K 
Y Z 

This is expanded into I ME K which quickly becomes 73.8^35269 

GHJK P ARLIMENT 

WXYZ BCDFGHJKO 

QSUVWXYZ 

This last example was very easy because none of the letters V W X Y Z ap- 
peared in the key word; but other cases should hardly prove more difficult# 

h# Two additional methods that have been encountered for deriving 
mixed"" sequences maybe mentioned# One is a slight modification of the 
preceding paragraph, when the key word contains repeated letters : 

187 3' 4 9*526 
COM, IT ,E , 

ABDFGHJKL 

NPQRSUVWX 

Y Z which produces the mixed sequence: 

CAHYEKWFRIGSJVLXMDQOBPZTHU 

The other method is an interrupted-key columnar transposition system:-^ 

513^26 

V A L . E Y 
B C) 

D F G H I) 

JKM) 

N 0 P Q) 

R) 

6 T U W X Z) which produces the mixed sequence: 

ACFKOTE IXLGMPUHQWVBDJKRSYZ 

The first example will succumb to the treatment outlined in subpar. g, 
whereas the second method is vulnerable owing' to the presence of the 
fragments D J N, F K 0, and G M P in the sequence which may be anagram- 
med# Note the fair-sized fragment B D J N R S, composed of an ascending 
sequence of letters; this is an outward manifestation of the interrupted- 
key columnar method# 

i. There are still other methods used for the production of mixed 
sequences, but space does not permit giving further examples# However, 
the student should by this time be able to devise methods of attack for 
any special cases that may present themselves, based upon the crypt- 
analytically exploitable weaknesses or peculiarities inherent in the 
system of cryptography involved. 



17 

It is to be noted that in this particular case the numerical key • 
serves two purposes : (l) determining the cut-off point (and therefore 
the number of letters) in each row of the diagram, after the appearance 
of the keyword; and (2) determining the order of transcription of the 
columns , 



RESTRICTE D 



106 



REF ID: A5 68 95 



IS f^Arck \$S5 

i : *?*"-- * 

REOTRIOTEB - 

»■ 

TABLE OF'COMEEHTS 
MILITARY CRYPTANALYSIS, PART I 
Monoalphabetic Substitution Systems 



Section Paragraphs Pages 

I. Introductory remarks. . ... 1-3 1-10 

- i 

II. Basic cryptologic considerations 4-13 11-20 

III. Fundamental cryptanalytic operations. 14-20 21-30 

. - — . . y - 

IV. Frequency distributions and their 

fundamental uses 21-28 31-54 

T 

V. Unilateral substitution with standard 

cipher alphabets............ 29-37 55-74 

■*- -V 1 . i r-* * - 

VI. Uniliteral substitution with mixed cipher 

alphabets.... 1 ^ . 38-91 75-106 

VII. Multiliteral substitution with s ingle - 

equivalent cipher alphabets...... .......... 52-56 107-120 

VIII. Multiliteral substitution with’ variants ....;.. 57-63 121-150 

IX. Polygraphic substitution systems 64- 151- 

X . Concluding remarks • • ......... 

APPENDICES 



1. Glossary ' 

2. Letter frequency data - English 

3. Word and pattern lists - En ;lish 

4. Service terminology; stereotypes...... 

5. Letter frequency data - foreign languages 

6. List of frequent words - English and foreign languages. 

T . Cryptographic supplement 

8. Lester S. Hill algebraic encipherment 

9. Open codes and concealment systems 

10 . Communication intelligence operations 

11. Principles of communication security 

12 . Bibliography; recommended reading 

13. Problems - Military Cryptanalysis, Part I 

14. Foreign language problems... 

IMDEX 



t * 



RESTRICTE D 



iii 



,- REQTniCTjjip , 



REF ID: A5 68 95 




REF ID : A56895 

RESTRICTED 



_ SECTION, VII “ . ' 

, JMULTILITERAL SUBSTITUTION WITH S INGLE -EQUIVALE1W CIPHER ALPHABETS 

■ ■ -Paragraph 



General types of multiliteral cipher alphabets * * - 52 

The ; Baconian and Trithemlaa ciphers ...••*••• 53 

Analysis of multiliteral, monoalphabetic substitution ciphers ...... . 

Historically interesting examples 55 



The _ international (Baudot) teleprinter code 5^ 

52. General types of multlllteral cipher alphabets .—a. $p#9a|L{!$i&r 
betic substitution methods in general may be classified into 
and multiliteral systems. In the former there is a strict M one-to-oja© w 
correspondence between the length of the units of the plain and those of 
the cipher text; that is / each letter of the plain text is replaced by a 
single character in the cipher text. In the latter this correspondence 
is no longer lp:lc but may be lp:2 c , where each letter of the plain > text 
is replaced by a combination of two characters in the cipher text; or 
3p*3 c > where a three -character combination in the cipher text represents 
a single letter of the plain text, and so on. A cipher in which the cor- 
respondence is of the lpSl c type is termed uniliteral in character; one 
in which it is of the 3p:2 c type, biliteral ; lp:3 c , triliteral , and so on. 
Ciphers in which one plaintext letter is represented by cipher characters 
of two or more elements are classed as multiliteral. 

b. Biliteral alphabets are usually composed of a set of 25 or 2 6 
combinations of a limited number of characters taken in pairs. An 
example of such an alphabet is the following: ' 



Plain- — — 


--- A 


B 


C 


D 


E 


F 


G 


H 


I 


J 


K 


L 


M 


Cipher 


— ww 


m 


WI 


WE 


WE 


HW 


HH 


HI 


HP 


HE 


HE 


IW 


IH 


Plain 


— N 


0 


P 


Q 


R 


S 


T 


U 


V 


W 


X 


Y 


Z 


Cipher- 


— 11 


IT* 


IE 


TW 


TH 


TI 


TT 


TE 


EW 


EH 


El 


EE 


EE 



This alphabet is derived from the cipher square or matrix shown in 
Fig. l6. The cipher equivalent of each plaintext element is made up of 
two coordinate letters from outside the cipher matrix, one letter being 
the coordinate of the row, the other being the coordinate of the column 

^ The terms unillteral and multiliteral, although originally applied 
only to cipher text composed of letters, are used here in their broader 
sense to enibrace cipher text in letters, digits, and even other symbols. 
In more precise terminology, these terms would probably be monosynibolic 
and polysymbolic, respectively, but the terms unillteral and multiliteral 
are too well established in literature to be changed at this late time. 



JflggTmC TEB- 



107 



REF ID: A5 68 95 - - 

RIpSTOC r J?gD, . _ 

in which the plaintext letter is located* In other words, the letters at 
the side and top of the matrix have heen used to designate, according to 

t*> 

WHITE 

♦ ,' T - w 

H 

(1) I 

« T 

• • * E 



- • ■ - Figure 1 6. ' - 

a coordinate system, the cell occupied by each letter within the matrix* 
The letters (or figures) constituting the coordinate elements of such 
matrices are termed row and column indicators . ' 

c. If a message is enciphered by means of the foregoing biliteral 

alphabet, the cryptogram is still monoalphabet ic in character. A fre- 
quency distribution based upon pairs of letters will obviously have all 
the characteristics of a simple, uniliteral distribution for a monoalpha- 
betic substitution cipher. . . , ~ i 

d. The cipher alphabets shown thus far in this text have involved 

only letters, but alphabets in which the cipher component consists of 
figures, or groups of figures, are not uncommon in military cryptography.^ 
Since there are but 10 digits it is obvious that, in order to represent 
an alphabet of more than 10 characters by means of figure ciphers, combi- 
nations of at least two digits are necessary. The simplest kind of such 
an alphabet is that in which Ap=01, Bp=02, . . . Zps26j that is, one in 
which the plaintext letters have as their equivalents two-digit numbers 
indicating their positions In the normal alphabet. , ^ 

e . Instead of a simple alphabet of the preceding type, it is pos- 
sible"" to use a diagram of the type shown in Fig. IT. In this cipher ■’* . 





1 


2 


_2_ 


4 


_5_ 


6 


_x_ 


8 


_2_ 




1 


A 


3 


c 


D 


E 


F 


G. 


H 


i 


j 


2 


K 


L 


M 


N 


0 


P 


Q 


R 


s 


T 


3 


U 


V 


W 


X 


Y 


Z 


* 


> 


• 

• 


• 

£ 



Figure 17. 



’ ^ Although, as an extension of this idea, cipher alphabets employing 

signs and symbols are possible, such alphabets are not suitable for 
modern cryptography because they can be neither telegraphed nor tele- 
phoned with any degree of accuracy, speed, or facility. 



•A 


B 


C 


D 


E 


F 


G 


H 


I-J 


K 


L 


M 


N 


0 


P 


Q 


R 


S 


T 


U 


V 


W 


X 


Y 


Z 





■ REF ID: A5 68 95 

" « - - it . f |% 

RESTRICTED 

the lettfer Ap Is represented "by the dinomg3 liy b_ By the dinome 12, 
etc. Furthermore, this matrix includes provision 1 for the encipherment of 
some of the frequently-used punctuation marks in addition to the 26 let- 
ters. . . ' ' ' 

f . Other types of billteral cipher alphabets are illustrated in the 
examples below; ' ‘ 





5 


6 


7 


8 


JL 


go] 


- 


1 


2 


3 


5 


6 


JL 


8 


9 


1 


A 


B 


C 


D 


E 


"F 


: 1 


A 


B 


C D 


E 


F 


G 


H 


I 


2 


G 


H 


I-J K 


L 


M 


2 


J 


K 


L M 


N 


0 


P 


Q 


R 


3 


W 


0 


P 


Q 


R 


S 


3 


S 


T 


U V 


W 


X 


Y 


z 


* 


k 


T U-V W 


X 


Y 


z 


































• 






•‘Figure 19. 












Figure l8a 


• 








-V« .’j- 








- 






-M 


u 


N 


I 


C 


H 




‘A 


B 


C D 


E 


F 


G 


H 


I 


B 


G 


7 


E 


5 


R 


M 


. . a’ 


A 


D 


G J 


M 


P 


S 


V 


Y 


E 


A 


1 


N 


Y 


B 


2 


B 


B 


E 


H K 


W 


Q 


T 


W 


Z 


R 


C 


3 


D 


h 


F 


6 


C 


C 


F 


I L 


0 


R 


U 


X 


1 


I» 


H 


8 


I 


9 


J 


t\ 


D 


2 


3 


4 5 


6 


7 


8 


9 0 


I 


IC 


L 


0 


P 


Q 


s 




















R 


T 


U 


V 


W 


X 


z 








Figure 21. 









— - - » # . j.. i * \ ! 

Figure 20. ’ - v - -- -- 

£. It is to be noted that in alphabets of the foregoing types, the 
row indicators maybe distinct from the column indicators (e.g., Fig. l8), 
or they may not (e.g.. Fig. 19); of course, when there is any duplication 
between the row and column indicators, it is necessary to agree beforehand 
upon which indicator will" be given as the first half of the equivalent 
for a letter, in order to avoid ambiguity, (in all of the systems de- 
scribed in this and subsequent sections of this text, the row indicator 
will always form the first part of an equivalent) . When letters are used 
as row" and column Indicators they may form a key word (e.g.. Fig. 20), or 
they may not (e.g.. Fig. 2l); the key words, if formed, may be identical 
(e.g., Fig. l6) or different (e.g.. Fig. 20). Furthermore, the plaintext 
letters maybe arranged within the matrix as a mixed sequence (e.g.. Fig. 
20), either systematically- or random-mixed; and the matrix may contain, 
in addition to the letters of the alphabet, punctuation symbols (Fig. 17), 
numbers (Figs. 20, 2l), etc., permitting their enc ipherment as such, in- 
stead of having to be spelled out. 



3 

A pair of digits is called a dinome ; similarly, a tr 3 nomo is a set 
of three digits ; a tetranome , a set of four digits ; etc . Although a 
single digit would properly be termed a mononome, for the sake of euphony 
it is shortened into the term monome. 






REF ID: A5 68 95 



h. When letters are vised ag £pv .and column Indicators, 'they may he 
selected so as to result in producing cipher text that resembles arti-. 
ficial words ; that is, words composed ,of alternate vowels and consonants. 
For example, if in Figure 1 6 the row Indicators consisted of the vowels 
A E I 0 U in this sequence from the top down, and the column indicators 
consisted of the consonants B C D' F G in this Sequeftcd' from left to right, 
the word RAIDS would he enciphered as OCABE FAFOD, which very closely 
resembles code of the type formerly called artificial code language. 

Such a system may he called a false , or pseudo -dodo" system. 

i. As a weak type of subterfuge, hllitera! ciphers "may involve a 
third"*character appended to the basic two -character cipher unit; this is 
done to "camouflage” the biliteral nature of the cipher texb. This "third 
character may he produced through the "use of a cipher matrix of the type 
Illustrated in Fig. 22 (wherein Ap»6ll, Bp=6l2, etc.); or the third char- 
acter may he a "sum-checking" digit which is the non-carrying sum (l.e., 



the sum modulo 10)5 of the preceding two digits, such as in the trinomes 
257, 831, end 662 } or it may merely he a randomly-selected character .(in- 
serted solely for the purpose of Reading the cryptanalyst astray). 



- i » *■ + * ,J 

-1 2 3 4 5 



61 


A 


B 


a 


D 




72 


F 


G 


HI-JK 


83 


L 


M 


K 


0 


P 


94 


Q 


R 


S 


T 


U 


05 


V 


W 


X 


Y 


Z 



Figure 22. 

. > ' ' . ' ' » - T. •• :‘-pZ *5; A »r r ,• * ' 

. Another possibility that lends Itself to certain, multilateral 
ciphers is the use of, a word spacer or word separator . This wprd.qepa- 
rator might he represented by a value in the matrix; i *e . , "^theT separator 
is enciphered (for instance, the diname " 39 ” in Fig. 19 might stand .for 
a word separator) • The word separator miglit instead he a single element 
not otherwise used in the cryptosystem; i.e,, unenciphered , and thus not 
giving rise to any possible ambiguity. Thus, in Fig. the jligit 0 arid 
in Fig. 21 the Vetter J might he. used as word separators, -since no con- 
fusion would a„ Lie in decrypting. . . - 



.Prior to 193*1-, international telegraph regulations .required codo. lA 
words of five letters to contain at least one vowel .-and code words pf ten 
letters to contain at least three vowels. The International Telegraph 
Conference held in Madrid in 1932 amended these regulations "to permit the 
use of 5-letter code groups containing any combination of letters. These 
unrestricted code groups were authorized for use. after p l. January 193^ • 

The term modulo (abbreviated mod ) pertains to r a cyclic" scale or 
basis of arithmetic; thus, in the modulus of 7, the numbers 8 and 15 are 
equivalent to 1, and 9 and 16 are equivalent to 2, etc*; or expressed 
differently, 8 mod 7 is 1, 9 mod 7 is 2. In cryptology, many operations 
are expressed mod 10 and mod 2 6. 




PEF.JEbr:A5€895 '' 
v *.* r j 



RESTRICTED _ 

k. The biliteral alphabets yielded by the matrices of Figs'. 16-21 
may also be termed bipartite , because the cipher units of these alphabets 
may be divided into two separate parts whose functions are clearly de- 
fined, viz ., row indicators end column indicators. As will be discussed 
later, this bipartite nature of most biliteral alphabets produced from 
.cipher matrices constitute one of the weaknesses of these alphabets which 
make them recognizable as such to a cryptanalyst. However, it is possible 
to employ a cipher matrix in a manner which will produce a billteral 
alphabet not bipartite in character. For example, using the matrix of 
Fig. 23 one could produce the following billteral cipher alphabet in 



- •' 09 

15 

■ 21 
~ ' 27 
’ - 33 



' - Figure 23 • ' 

which the equivalent for any letter in the matrix Is the pujft 
coordinates which indicate its cell in the matrix? 



Plain — 


A 


B 


c 


D 


£ 


F 


G 


g 


I 


«T 


n 


h 


M 


Cipher— 


l4 


20 


19 


12 


22 


23 


24 


10 








17. 


£6 


Plain — 


N 


0 


p 


Q 


R 


S 


T 


u 


V 


w 


25 


Y 


Z 


Cipher — 




29 


30 


31 


13 


32 


34 


16 


35 


36 


37 


11 


38 




* . — 1 


. - 7 


- : 




• ’ 






l .» 




.C-. 


‘ i • 




„ “ ’ 



The cipher units of this' alphabet are”, of course, biliteral $ but they are 
not bipartite. Note the equivalent of A_, that is l4— if divided, it 
yields the digits 1 and 4 which have no meaning per se : plaintext letters 

whose cipher equivalents begin with 1 may be found in two different rows 
of the matrix, and those whose equivalents end in 4 appear in three dif- 
ferent columns. ... 



1 


2 


3 * 


5 


H 


Y 


D R 


A 


U 


L I-J C 


B 


E 


F 


G K 


H 


N 


0 


P Q 


S 


T 


V 


W X 


z 



53* The Baconian and Trithemian ciphers ,— a. An interesting example 
in which the cipher equivalents are five-letter groups and yet «the re- 
sulting cipher is strictly' monoalphabetic in character is found in the 
cipher system invented by Sir Francis BacoxL (1561-2.626) over 300 years 
ago . Despite its antiquity the system possesses certain features of 

_ .**“■ , a f * * * ' - * # - - 1 - 



- i# 

. - w _ _ 




/ " ' -■ r* ‘ .v ; £, 



RESTRICTED 



111 





4 



REF TD:A 56895 



- REOTniCTED 

merit which are well worth noting. 0 Bacon proposes the following 24- 
element cipher alphabet, composed of permutations of two elements taken 
five at a time:? 

♦ „ , 



A=aaaaa 


I-Jrabaaa 




’ . R"baaaa 


Bcaooab 


ICrabaab • 




Ssbaaab 


Czaaaba 


Lzababa" 




. Tcbaaba 


Dzaaabb 


Mrababb 




U-V zbaabb 


Eraabaa 


N-dbbaa 




Wsbabaa 


Fraabab 


Ocabbab 




Xrbabab 


Gcaabba 


Prabbba 




, . Yrbabba 


Hraabbb 


Qcabbbb 




Zrbabbb 



If this were all there were to Bacon’s invention it would he hardly worth 
bringing to attention. But what he pointed out, with great clarity and 
simple examples, was how such an alphabet might be used to convey a 
secret message by enfolding it in on innocent, external message which 
might easily evade the strictest kind of censorship. As a very crude 
example, suppose that a message is written in capital and lower-case let- 
ters, any capital letter standing for an "a" element of the cipher alpha- 
bet, and any small letter, for a "b" element. Then the external sentence 
"All is well with me today' can be made to contain the secret message 
"Help." Thus: 



A L 1 is 

t a a b b b. 

v - 

H 



WEIL 
a a b a 

' v — 

E 



W I t H m E 

a, ,a b a b a. 

>_/ N — -y» — ' 

L 



Today 

a b -b b a ' 
> 

P 



Instead of employing a device so obvious as capital and small letters, 
suppose that an "a" element be indicated by a very slight shading, or a 



° For a true picture of this cipher, the explanation "of which is often 
distorted beyond recognition even by cryptographers, see Bacon’s own des- 
cription of it as contained in his De Augmentls Scientiarum- (The Advance - 
ment of Learnin g), as translated by any first class editor, such as Gilbert 
Watts (l64o) or j'lilis , Spedding, and Heath (l857, 1870). The student Is 
cautioned, however, not to accept as true any alleged "decipherments" ob- 
tained by the application nf Baeoh's cipher to literary works of the 16th 
century. These readings are purely subjective.’ 

7 1 .■ ' 

Bacon’s alphabet was called by him a "bilitteral alphabet" because it 
employs permutations yf two letters . But -from the cryptanalytlc stand- 
point the significant, point is that each plaintext letter is represented 
by a 5-character equivalent. Hence, present terminology requires that 
this alphabet be referred to as a ouinqueliteral alphabet . Although the 
quinqueliteral alphabet affords 32* permutations. Bacon used only 24 of 
them, because in the l6th century the letters I and J, U and V were used 
interchangeably. Koto the regularity of construction qf .Bacon’s bilitcral 
alphabet, a feature which easily permits its reconstruction from memory. 




112 



' ■ ■ - ‘REE* ' I-D : A568-95 

■ * \— 

"* ■* - “ IS ’ — 1- ’ i ^ T ■ > 

RESTRICTED . .. 

• » - - * - - ... 

very slightly heavier stroke • Then a secret message might easily he thus 
enfolded within an external message of exactly opposite meaning. The 
number of possible variations of this basic scheme is very high. The 
fact that the characters of the cryptographic text are bidden in some 
manner or other has, however, no effect upon the strict monoalphabetlcity 
of the scheme. 

b. Almost 100 years before Bacon’s time, the abbot Trithemlus, 
born Johann von Heydenberg ( l462-151<j), Invented a‘ triliteral alphabet 
which he evidently intended to use in a fashion similar to Bacon’s 
alphabet; i.e., as a means of disguise or cov er for a secret text. This 
alphabet, modified to include the 2 6 letters of the present-day English 
alphabet, is shown in Fig. 23 below; it consists of all tke permutations 
of three things taken three at a time, i.e., 3^ or 27 in all. 



A=lll 


D=121 


G=131 ’ 


J=211 


M=221 


P=23l 


s=31i “ 


v=32i 


Y=331 


B=112 


£=122 


H=132 


K=212 


11=222 


Q=232 


T=312 


W=322 


z=332 


0=113 


F=l23 


1=133 


L=213 

t: -z- 


' 0=223 

« is U . 


R=233 

1 r 1 ^ a 


'17=313 


■X=323 


#=333 


• 


■■ ■ T- " 


- -- -} * t -=rr ' 


\y' \j. 


- *T 

'Figure 23. 

. > 1 i. * J-- J , 9 « 4 


' t’ 


I- -• p 


' * 



The cipher text of course does not have to be restricted to digits; any 
groupings of three things taken three at a time will do. ‘ 



Analysis of multiliteral, monoalphabetic substitution ciphers . • 

a. Biiiteral ciphers and those of the other mnltiliteral (trilateral , 
quadriliteral, . . .) types afeH&'ften readily detected externally by the 
fact that the cryptographic text is usually composed of but a very limi- 
ted number of different characters . They are handled in exactly the same 
manner as are uniliteral, monoalphabetic substitution ciphers. So long 

as the same’ character, or combination of characters, is always used to 
represent the same plaintext letter, and so long as a given letter of the 
plain text is always represented by the same character or combination of 
characters, the substitution is strictly monoalphabetic and can be handled 
in the simple manner described in the preceding section of this text. 

~i 

b . In the case of biliteral ciphers in which the row and column, in- 
dicators are not identical, and the direction of reading the cipher pairs 
is chosen at will for each succeeding cipher pair, an analysis of the 
contacts of the letters comprising the cipher pairs will disclose that 
there are two distinct families of letters, and a cipher pair will never 
consist of two letters of the same family. With this fact discovered, 
the cipher may be quickly reduced to unlliteral terms and solved iu the 
manner previously mentioned. 

c. If a multiliteral cipher includes provision for the encipherment 
of a word separator, the cipher equivalent of this word separator may be 
readily identified because it will have the highest frequency of any ci- 
pher unit. On the other hand, if the word separator is a single char- 
acter (see subpar. 52j}. on the use of the digit 0 and the letter J), this 



RE S TRICTED 



113 



iHEBTmCTED 



REF ID: A5 68 95 



character may be identified throughout the encrypted text hy its position- 
■ al appearance spaced "vordlength-vise*' in the cipher text, and by the 
fact that it never contacts itself. If this single character is used as 
a null indiscriminately throughout the cipher text, instead of. as a v$rd 
separator, the analysis is a bit more complicated but not as great as 
might be thought. 

d. As a general rule, it is advisable to reduce multiliteral cipher 
text to unillteral equivalents^ especially if a triliteral frequency dis- 
tribution is to be made. w If not more" than .36 different combinations are 
present in a cryptogram, the extra values over 26 maybe represented by 
• digits for the purpose of this reduction. If, however, more than 36 
different combinations are found in the encrypted text, it is usually not 
worth the' trouble to attempt any uniliteral reduction, and the cipher 
text can be attacked in its multiliteral groupings . 

e# As one of the first steps in the solution of any multiliteral 
cipher in letters which appears to Involve the use of a cipher matrix, 
it is generally advisable to anagram the letters comprising the row ajad 
column Indicators in an attempt to disclose any key words for these In- 
dicators » 'When the anagramming process does disclose such a key word or 
words, the next step is to make a skeleton reconstruction matrix which la 
a duplicate of the original enciphering matrix in that the indicators are 
arranged in the same order as on the original. Then, as plain text is 
recovered in the cryptogram by any of the methods outlined in the previous 
section of this text, the recovered plaintext letters should be Inserted 
in the proper cells of the reconstruction matrix, so that any systematic 
arrangement of the plaintext letters, if present in the original, may be 
disclosed prior to recovery of the complete plain text. Furthermore, it 
may in some instances be found worthwhile, immediately after successfully 
uncovering the key words used as indicators, to make a frequency distri- 
bution of the particular cryptogram In the form of tally marks within the 
*• properly arranged frame of the reconstruction matrix, because it may be 
that a few moments * study of the Ibcations of the crests and troughs in 
the distribution made in that form may, if the plaintext letters are ar- 
ranged in the normal sequence or in a keyword-mixed sequence (especially 
if it is related to the keywords for tho indicators), provide a basis 
for the derivation of this sequence at one stroke, without recourse to 
analysis of W i cipher text. 

55 * Historically interesting examples .— a. Two examples of multi - 
literal ciphers of historical interest will be cited as Illustrations. 
During the campaign for the presidential election of 1876 (Hayes vs. 
Tilden) many cipher massages were exchanged between the Tilden managers 
and their agents in several states where the voting was hotly "contested. 
Two years Inter the Hew York Tribune® exposed many irregularities In the 





1879 



New York Tribune, 



I ■ 

. 1 

Extra No. Uk, The Cipher Dispatches, "New York, 



HEOTmCTED 



114 



RESTRICTED 



REF ID: A5 6 8 95 






campaign "by publishing the decipherments of niany of these messages 
These decipherments were achieved hy two investigators Employed by the 
Tribune, and the plain text of the messages'^ seems to’ show that illegal 
attempts and measures to carry the election for Tilden' were made "by his 
managers. Here is one of the messages: . . 



JACKSONVILLE, Nov. 16 (1876). 

GEO. F. RANEY, Tallahassee. t 

Ppyyemnsnyyypimashnsyyapit'Spaadnshns 
pensshnsmmpiyysnppyeaapielssyeshainsssp 
eeiyyshnynsssyepiaanyitnsphyyspyypinsyy 
ssitemeipimmeisseiyye is si t e ™i epyyp e e iaas s 
imaayespnsyyiansssei s s'm in p pnspinssnpins in 
imyyitemyysspeyy m'm nsyyssitspyypeepppma 
a a y y p i i t 

L' Engle goes up tomorrow. - “ . _ 

- *? DANIEL. 



Examination of the message discloses that only ten different letters are 
used. It is probable, therefore, that what one has here is a cipher 
which employs a multiliteral alphabet. First assuming that the alphabet 
is one in which combinations of two letters represent single letters of 
the plain text, the message is rewritten in pairs and substitution of 
arbitrary letters for the pairs is made, as seen below: 

• ■ ■- Silt.f C* t MB V « t » i v ■ * r x 

— A * 

HP YY ’ EM NS NY YY PJ HA SH NS YY S3 «t0. 

A B C.D E B F 0 5 D.B'I eto. 



A triliteral frequency distribution .is then made and analysis of the mes- 
sage along the lines illustrated in the preceding section of this text 
yields solution, as follows: 

Jacksonville ? Nov. l6. 

GEO. F. RANEY, Tallahassee: 

Have Marble and Coyle telegraph for influential men from Delaware and 
Virginia. Indications of weakening here. Press advantage and watch 
Board. L ’Engle goes up tomorrow. 

DANIEL. 



b. The other example, rising numbers, is as follows': 



S. PASCO 


and E. 


M. L 


’ENGIE: 


- 




84 


55 


84 


25 


93 


34 


82 


31 


93 


20 


93 


66 


77 


66 


33 


84 


52 


48 


44 


55 


42 


82 


48 


89 



-*■ . f f - r 

Jacksonville, Nov, 17. 



31. 


~75 


93 


82 


77 


33' 


55 


42 


66 


.31 


31 


93 


,20 


82 


33 


66 


42 


93 


31 


82 


66 


75 

ft 


31 


93 



- dmiel/ * 



RESTRICTED 



115 



. . REF. ID: A5 68 95 , 

RE S TRICTED - , / . 

' * ^ 

There were, of course, several messages of like ija^ure, and examination 
disclosed that only 2o different numbers in ail were'used. * Solution of 
these_ ciphers followed v§pjr 'easily, the decipherment of the one given 
above being as follows : ■ 

• * *' * “ * r T\i* •?*! , . r 

Jacksonville, Nov. 17. 

S. PASCO and E. M. L’BNGLE: 

Cocke will be ignored, Eagan called in. Authority reliable • 

DANIEL. 



c , The Tribune experts gave the following alphabets as the result 
of their decipherments: 



AA«0 


EN“Y 


IT=D 


NSrE 


PP=H 


SS=N 


_ 


. ’i ' 


AI=U 


EP=C 


ma=b 


NY=M 


SH=L 


YE=F 






EI*I 


IA*K 


mzG 


FE3 


SN=P 


YI=X 






EM=V 


B1«=S 


NN=J 


PI =B 


SP=W 


YY=A 






20 =D 


33=N 


44=H 


6 2=X 


77=0 


89=Y 


*" ••"■»*» *■ »" 


u , 


25=K 


34=w 


48:3 


66 =A 


82=1 


93 =E ‘ 


* - - t «- ■ 1 - ■ - - 


“■ 


27=s 


39=P 


52=U 


68= F 


84 =C 


96 =M 


■ 




3l=L 


42=R 


55=0 


75=B 


87=V 


99=J 


. 1 « t .» 


- ■* 



!•’* - 1J' 



They did not attempt to correlate these alphabets, or at' least tfcey say 
nothing about a possible relationship . The present author has, however, 
reconstructed the rectangle upon which these alphabets are based, and It 
is given below (Fig . 24) . 



"2d Letter or Number 



HI SPAYMENT 
12 34567890 





I REaTRICTED r ’ u 6 




REF ID -: £56895 



RESTRICTED 



It is amusing to note that the conspirators selected a? their key a 
phrase, quite in keeping with their attempted illegalities ~.HIS PAYMENT - 
for bribery seems to hove played a considerable part in that campaign. 

The blank cells in the matrix probably contained proper names, numbers, 
etc .9 ' 

56 . The international (Baudot) teleprinter code . --a. Modem print- 
ing telegraph systems,!^ or teleprinter systems as they" are more often 
called, make use of a five -unit code-D- or alphabet which is similar to 
the Baconian alphabet treated in par. 53* Like the Baconian alphabet, 
the teleprinter alphabet is composed of permutations, .of two elements 
taken five at a time, making it possible to, obtain 32 different permu- 
tations, 2 6 of which are assigned to v bhe.l§$terq; of the. alphabet, leaving 
1 for an "idle condition" and 5 for certain pointer operations called 

functions, such as "space", "figure shift", "letter shift,." etc. 

1 - - - 1 • $ 

. J ‘A ^ 

_ b. During electrical transmission, the two ^distinct elements of 
which each character, is ,cgmpo?ed take _ the form, of (l) a timed interval of 
electrical current and (2) a timed interval of no current, which are 
commonly referred to as "mark" impulses and "space" impulses, respective- 
ly. In certain operations, a paper tape is prepared of the traffic to be 
transmitted, or a paper tape may be prepared of the incoming traffic at 
the receiving end; in such tapes, the elements of the Baudot characters 
take the form of punched holes ("mark" impulses ) and imperforate positions 
("space" impulses; ... - - 



.i — ,* 



9 

As was. mentioned in a previous footnote, a matrix containing such 
items would be termed' a* syllabary Square; jor example of such matrices 
see the treatment of syllabary squares and* code charts in Section X. ^ 

Such systems are characterised by the. transmission and reception- 
printing of messages by electrical means, .incorporating two electrically- 
connected instruments , resembling typewriters . .When a key of the keyboard 
on the transmitting instrument is depressed, an electrical signal is 
transmitted to the receiving instrument , causing the’ corresponding char- 
acter to be printed therein. Usually the message is printed at the local 
as well as the distant station. The system has been .adapted to radio as 
well as wire and overseas cable transmission, _ ' _ • 

The five -unit .code was first; applied, to teleprinter systems by Jean 
Maurice Emile Baudot (1845-1903), and is commonly known as the Baudot 
code . It is worthwhile to point out that Baudot apparently constructed 
his alphabet to correspond' with normal frequencies, of characters (with 
certain exceptions), since .the most frequent ones are represented by per- 
mutations requiring the least electrical energy on the. basis of "marking" 
and "spacing." In this respect Baudot "took, a leaf out of Morse's note- 

1>00k< ” ' SWV •• 



St’"**’' 






y r i - - — "i * yt * 



.■* ” - . 



RESTRICTED. 



117 



- REE ID : A568 95 



c. The teleprinter co$£ in international use is given in Chart 7 f 
helowj wherein the mark and space impulses {known collectively as ’bauds ) 
are illustrated as the holes (shown as black dots) and ’’no-holes” of. 
teleprinter tape. The letter equivalents (’’lower case”) are self-explan- 
atory, The figure shift is used to change the meaning of a particular 
character to an ''upper” case” equivalent, ‘and when it is desired to return 
to lower case, the letter shift is used; in regular teleprinter ^usage. 



WEATHER SYMBOLS 



COMMUNICATIONS 




DlBQOq 
■UBUPIlHl 

ui 

□□□□□□I 

■□gBSiBSB 




Chart J, I^perhutfona}. telop^ntet code. 

the " communications” set of upper -case equivalents are the ones recorded 
on the typed copy by the teleprinter/ whereas' the ’’weather symbols” are 
the upper-case equivalents whicfy are printed in teleprinter systems Re- 
signed for the sendipg and receiving of weather, information. The spap^ 
is used to separate words? the .carriage, return (C.R.) effects the retupj} 
of the teleprinter carriage to the right and the line feed (L.F.) rolls 
the platen to the next line for printing (cf, the corresponding functions 
of an ordinary typewriter) 1 In addition, when the upper-case equivalent 
of ”S" is used, a bell rings in the receiving ‘ teleprinter ' as ^ a Signal to 
call the operator to Mb machine, or to indicate that traffic is about' to 
be sent. * , • • r y ’ ; ' 

- - 1 * *■ w* I Jf ■ 1+ 'f t , . I . * ' 

d. In Fig. 25 1 b shown a portion of, a teleprinter tape containing 
the beginning of the phrase “New is the time for all- good men ...” 




NOW IS THE TIME'; JfOTi ALL'.GOOti MEN " 

Figure 25. - . 

The small holes, one of which appears in every position of tiic tape be- 
tween the second and third levels, dre sprocket holes used for advancing 
the tape through the transmitter unit. 














RESTRICTED 



- REF- -ID": AS6B'B5 



T ' V 
u . . 

■’k* £**'. .1# . — 



V 






e. It is to to emphasized that messages are not made secure from 
unauthorized reading merely by sending them by means of an ordinary tele- 
printer system- -the teleprinter alphabet is internationally known, just 
as the English, Russian, etc. alphabets are. In order to provide secur- 
ity for a teleprinter message, it is just as necessary to app]y thereto 
some sort of cryptographic treatment as it is to any other kind of mes- 
sage . The cryptosystems used for teleprinter t encryption may involve 
either, or both, of the two classes of cryptographic treatment, viz*, 
substitution and transposition. A substitution treatment "might involve 
changing certain of the mark impulses of the characters comprising a mes- 
sage to space impulses, and vice versa, according to a prearranged sys- 
tem; a transposition treatment might involve changing the order of the 5 
impulses in the Baudot equivalents for. the characters comprising a mes- 
sage; and so on. The cryptographic treatment can be accomplished by a 
special cipher attachment (called an " applique unit”) to a teleprinter; 
thus ho modification of the teleprinter itself would be necessary. There 
are, of course, self-contained cipher teleprinters designed as such for 
engineering or cryptographic reasons, or both. 



f . In the analysis of encrypted tele]?rinter systems, recourse is 
had to special tables^ of the frequencies of single Baudot characters, 
digraphs, trigraphs, etc., as they appear in teleprinter traffic. It is 



:ic, 



, as in any other type of 
;or, this character has the , 
Furthermore, one of the 



important to note that in teleprinter trafi 
traffic involving the use of a word separa; 
highest frequency of any plaintext element 

highest-frequency plaintext digraphs, in addition to those wherein the 
word separator constitutes one of the elements , will be the coitil lnation 
"carriage-return/line-feed" , since this combination of characters is used 
in the normal procedure of typing each line of text on the teleprinter. 



In such tables, as is common in cryptanalytic practice, the mark im- 
pulses are designated by a plus symbol ( + ), and the space impulses are 
designated by a minus symbol ( - ) . In addition, it is usual in such 
tables to denote the character representing the figure shift by the digit 
"2”, the space by "3", the letter shift by "4” , the line feed by ”5”, the 
blank by ”6" , and the carriage return by "7” • 





RESTRICTED 



REF ID: A5 68 95 




REF ID:'A5 68 95 






RESTRICTED 



SECTION VIII 

• * r '- . . ffe'MULTILITERAL SUBSTITUTION WITH VARIANTS 

* t~- - ■' -- 

t ’* • — * j 

' . ■ Paragraph 

Purpose of providing variants in monoalphahetic substitution 57 

Simple types of cipher alphabets with variants..* ' 58 

More complicated types of cipher alphabets with variants............ 59 

Analysis Of simple examples ...... t ' 60 

Analysis of more complicated examples ....^. 6l 

Analysis involving the use of isologs ;;.V. 6z 

Further remarks on variant systems 63 

-- ■» ■ r » ( *■ * „ ' r " * - ^ k ** i „ j* - 

57 « ' Purpose of providing variants in monoalphahetic substitution . -- 
It has been seen that the individual letters composing ordinary 
intelligible plain text are used with varying frequencies; some, such as 
('in English) E, T, R, I, and N, are used much more often than others, 
such as J, K, Q, X, : and Z. In fact, each letter has a characteristic 
frequency which affords definite clues in the solution of simple mono- 
alphabetic ciphers, such as those discussed in the preceding sections of 
this text. In addition, the associations which individual letters form 
in combining to make up words, and the peculiarities which certain of 
them manifest in plain text, afford further direct clues by means of 
which ordinary monoalphahetic substitution encipherments of such plain 
text maybe more or less speedily solved. This has led cryptographers to 
devise methods for disguising, suppressing, or eliminating the foregoing 
characteristics manifested in cryptograms produced by the simpler methods 
of monoalphahetic substitution. One category of such methods, the one to 
be discussed in this section, is that in which the letters of the plain 
component of a cipher alphabet are assigned two or more cipher equivalents, 
which are called variant values (or, more simply, variants ) . 

b . Basically, systems involving variants are multilateral^ and, in 
such systems, because of the large number of equivalents made available 



Uniliteral substitution with variants is also possible. Note the 
following cipher alphabet, illustrated by Captain Roger Baudouin in his 
excellent treatise, Elements de Cryptographie, p. 101 (Paris, 1939 ) - 



Plain': 

Cipher: 



ABODE? GH I L MNOPQJR S TU V X Z 



LGORFQAHCMBT 
K X 

V 



IDNPUSYEWJ 

Z 



Baudouin proposed that Jp and Yp be replaced by 3 L; K_ by C or Q p ; 
W-n by W-p — thus four cipher letters would be available as variants 



d 



and 

for 



e high-frequency plaintext letters in French. 



-- .. — 



RESTRICTED 



121 



RESTRICTED 



REF ID: A5 68 95 



i 

"by the combinations and permutations of a limited number of elements, each 
letter of the plain text may be represented by several multiliteral cipher 
equivalents which may be selected at random. For example, if 3 -letter 
combinations are employed as the multiliteral equivalents, there are 
available 26’ or 17,57° such equivalents for the 26 letters of the plain 
text; they may be assigned in equal numbers of different equivalents for 
the 26 letters, in which case each letter would be representable by 676 
different 3 -letter equivalents; or they may be assigned on some other 
basis, for example, proportionately to the relative frequencies of plain- 
text letters . For this reason this type of system may be moFe completely 



described as a monoalphabetic, multiliteral [substitution with a multiple - ■ 
equivalent cipher alphabet *^ Some authors lerm such a, 'system 1 * simple ■ 
substitution with multiple equivalents"; otl ers term it ‘'monoalphabetic 
substitution with variants", or multiliteraji substitution with variants . 
For sake of .brevity and precise terminology, the latter designation will 
be employed in this text, it being understood without - further restatement 
that only such systems as are monoalphabetic will be discussed. 

^ c. The primary object oi? monqalphabetic substitution' with variants 
is t as has been mentioned t above, to provide several, Values which '.may be 
eiiiployed at random in a simple substitution of cipher ^equivalents -foV'the 
plaintext letters. ' . _ . . .... . , ,',t' ,.* 5 ^ 



t 1 



d. A word or two concerning the underlying theory of (monoalphabetic) 
multiliteral substitution with variants may not be amiss . ■ Whereas' iri 
simple or single-equivalent substitution it has been seen that 



(1) the same letter of the plain text is invariably represented by 
but one and .always the same character of the cryptogram, and 

(2) the same character of .the cryptogram invariably represents one 

and always the same letter of the plain text, * * ‘ : 



in. multiliteral substitution with variants it will be seen that 

. . ... - _ - --..if 

(1) the same letter of the plain text may be represented by one 

or more different characters of the cryptogram, but ■ ■ * " 

(2) the same character of the cryptogram nevertheless, .jjjyariably 
represents one and always 'tlie same letter’ of the. plain text r ... 



^8, Simple types of cipher alphabets with variants . — a. The mat- 
rices shown on the next page provide some of the simpler means for 
accomplishing monoalphabetic substitution with variants . The systems 
incorporating these matrices, are extensions of the basic ideas of multi- 
literal substitution treated in par. ' 52. The variant equivalents for 
any plaintext letter maybe chosen' at will; .thus, in Fig . 26, Ep=10, 15, 
60, or 65; in Fig. ’27, Ep=/sU c , AZ 0 ; FU C , FZ C , LU C , or LZ C ; etc. 



p 

Cf. the title of the preceding section, "Multiliteral substitution 
with single -equivalent cipher alphabets." ..... . ... . 



. j 1 
t ' 



• if 



. --~r- * 



rr; -'T- 



RESTRICTED 



122 



-REF ID: A568 95 



RESTRICTED 



6 l 

7 2 
8 3 

0 5 



6 


7 


'0 


9 0 








V W 


X 


Y 


Z 


















3 


2 


3 


4 5 








Q 


R 


s 


T 


U 


; 


' 




A 


E 


I 


0 


U 


A 


B 


c 


D E 


L 


F 


A' 


A 


B 


c 


D 


il 


T 


N 


H B 


A 


B 


c 


D 


Kl 


F 


G 


II I-JK 


M 


G 


B 


F 


G 


II I-JK 


V 


P 


J C 


F 


G 


II I-JK I 


L 


M 


N 


0 P 


N 


II 


C 


L 


M 


N 


0 


p 


¥ 


Q K D 


L 


M 


N 


0 


P 


a 


R 


S 


0? ti 


0 


I 


D 


Q 


R 


S 


T 


u 


X 


R 


L F 


Q 


R 


S 


T 


U 


V 


¥ 


X 


Y Z 


- P 


K 


E 


V 

»T’ 


W 

TT 


X 


Y 


z 


Z 

. J J-. j l ’ 


S 


M G 
* .-** 


V 


¥ 


X 


x 

V 


z 

“H 



Figure 26 



Figure 27 1 



■ff f — 



Figure 28 

<«ftl - ' "** 1 # 






•- V ¥ X Y Z 


. 0 


. I"'>' • r ’ 


Q R S T U 


"MH 


Z '■ 


•l h ¥ o‘p ■ ■ ■ ■■ 


J K' £ ; 


' ’ / * _ ‘ _¥ XT Y 


: -f g"h i ic !''■ * 


F G'S I 


'■ 8TUT 


AB.CDE 


ABODE 


NOPQ 



V Q L F A 
W R H G 13 
X S N H C 

Y T 0 I D 
Z U P K E 



ABODE 


0 M J F A 


E N A L U 


M J F A 


ENALU 


F G II I-JK 


•HKGB 


T R S F ¥ 


KGB 


a? R S F ¥ 


L M N 0 P 


LHC 


OI-JH Y X 


LHC 


OI-JH Y X 


Q R S T U 


I D 


D C M V K 


I D 


D C M V K 


V ¥ X Y Z 


E 


P G B Q Z 

•— A - _ 


E 


P G B Q Z 



Figure 29 



Figure 30 



Figure 3l 



7 4 

8 5 
96 



123^567890 



- -Figure' 32' 



123456789 



ABCDEFGHIJ 


7 4 1 


ABCDEFGHI 


KLMNOPQRST 


852 


JKLMNOPQR 


U V ¥ X Y Z . , : ; 


9 6 3 


STUV¥XYZ* 



Figure 33 



5 i 

6 2 

7 3 

8 4 



123456789 



123456789 



ABCDEFGHI 


0 8 5 1 


TERMINALS 


JKLMNOPQR 


962 


BCDFGHJKO 


STUV¥XYZ1 
2345 6. 789 0. 


' • 7 3 

4 


PQUV¥XYZ1 
2345678 90 


.1 - ■* • r -»■■ r • * 

• , Figure 34 


* » L*" 


. - •’ .*A 

Figure 35 



RESTRICTED 



123 




REF ID: A5 68 95 



b. It is to be noted that encipherment by means of the matrices in 
Figures 27, 28, and 31 is commutative j i.e., he coordinates maybe read 
in either row-column or column-row order without cryptographic ambiguity, 
since there is no duplication between the row and column coordinates. 

The remaining matrices above are ' non-c,ommu Native ; therefore a convention 
must be agreed upon as to the order of reading, the coordinates It should 
also be noted that inFigs^. 30 and 31" the ^letters .in’ th<j. square hqve been 
inscribed in such a manner that, coupled "with .the particular arrangement 
of the row and column coordinates, the. number of variants available for 
each plaintext letter is roughly proportional to the frequencies of the 
letters in plain text. A similar idea is fqund in Fig. 35, wherein the 
top row of the rectangle contains, a word composed of .high-frequency let- 
ters, and the coordinates are arranged in a manner roughly corresponding 
to the frequencies of plaintext letters. The matrix in Fig. 28 is a mod- 
ification of the pseudo-code system described in par. 52h, with the added 
feature of variants. k -■ .t . , ± w- 

c. Other simple ideas for producing iFnriant .systems ai?e matrices' 

such as the following: * ’ ‘ ' w ‘ ~ : N ^ 

: . • 1 . 1. .1 . - 1 - 1 * ? / 



T. U 



V X 



A B C 0 E F G II I-J K L II N 0 F Q R S T. U . V yt\ X Y Z. 



08 09 10 11 12 13 14 15 Id 17 18 19 20 21 22 23 24 25 01 02 03 04 05 06 07 
35 36 37 38 39 4o 4i I12 43 44 l'-5 46 47 48 49 50 26 27 28 29 30 31 32 33 34 
68 69 70 71 72 73 74 75 51 52 53 5 1 ' 55 56 57 58 59. 60 61 62 63 64 65 66 67 
87 88 89 90 91 92 93 94 95 96 97 98 99 00 76 77 78 79 80 81 82 83 84 85 86 




Figure 36 



E F 



M N 0 



Q R 



T U V W 



l4 15 16 17 18 19 20 21 22 23 24 25 26 01 02 03 04 05 06 07 08 09 10 11 12 13 
27 28 29 30 31 32 33 3*1 35 36 37 38 39 40 4i 42 43 44 45 46 hj 48 4-9 50 51 52 
58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 53 54 55 56 57 
81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 00 79 80 



Figure 37 



In these' two matrices there has been a regular inscription 61' the dinomes 
in the rows . furthermore, in Fig. 36 the dinomes 01, 26, 51, and 76 (i.e., 
the lowest number in each of the four sequences) give the key word (TRIP) 
for that matrix; and. in Fig. 37, the dinomes 01, 27, 53, and 79 denote 
the key word (HAVY) for thab matrix. The security of systems involving 
such matrices would of course be greatly improved if the dinomes. vere . 
assigned in a random manner; but bhon the easy mnemonic feature of the 
four sequences and the key word would be lost. 





REPTRICTE& 



'REF ID: A5 68 95 



a. interesting adaptation in a disc form of the typo of matrix 
illustrated in Fig. 37 is the following device reputedly once used by 
the Mexican Army: ’ - 




The device consisted of five concentric discs, the outer disc "bearing the 
2 6 letters of the alphabet, and the other four bearing the sequences 
01-26, 27-52, 53-78; and 79-00* The rotatable discs made it possible to 
change the keys at frequent intervals, without the necessity of writing 
out a new matrix each time. -> •' *• • * • • - * J* • 



r «is m r i .1 ni * i -*»/ L a l 



1 *- - r 1 



* * , i. ’ ■ ** ' 1 V l A JU- 



39 • More complicated types of cipher alphabets with variants * — 
a, Matrices such as those in Figs, 39* and 40 Wlov are termed 
frequential matrices , since the number Of cipher values available for any 
given plaintext letter closely approximates it’s relative plaintext fre- 



quency. 



i « flft .TT 



* «v‘ ml 

. * . -L L i J 


“W - 'j, I* 

A. 6 0 *D E 


• ■ ■ if. > < • i 

V W. X Y Z 


- . A 


T G A .U R 


'T E C A P 


TL 


S'LIEY . 


F.RHST 




C N D 0 M . 


. . E L T I H 


• ■ ■ n 


RAPT F.’ " 


V.Y s.o'v 


U. - 

- 1 1 , • 


N T X N E 


CERE? 


*" ^ a ■ 


* 7 

• 

■a 

+ 1 * 


1 >1 
*vi ‘ ■ 


V 


H 0 A T E 


‘A L E’Z’H 


V ■ 


I H R 0 Q 


ETRBT 


-,r . X, 


0IETA-, 


. .CNPES 


Y 


F T L 0 S 


AMT I U 


Z 


I S N D R 


IED0N 




(676 - cell matrix) 



Figure 38 



REDTRICTED 



125 





RESTRICTED 



REF ID: A568^5 



• I s 





6 


8 


9 


1 


5 


4 


3 


1 

7 


2 


1 


• * 


A 


1 


2 


3 


4 




6 


7 


8 


9 


T 


A 


A 


A 


C 


D 


E 


E 


I 


L 


N 


E 


If 


T 


R 


u 


C 


K 


I 


If 


G 


l 


A 


A 


C 


D 


E 


E 


II 


K 


If 


0 


1 


Q 


U 


A 


R 


A 


If 


T 


I 


E 


E 


3 


A 


B 


D 


E 


E 


II 


J 


If 


0 


R 


2 


U 


If 


E 


X 


P 


E 


If 


D 


E 


D 


8 


A 


D 


E 


E 


H 


I 


If 


0 


R 


S 


3 


I 


M 


P 


0 


S 


S 


I 


B 


L 


E 


9 


C 


E 


E 


G 


I 


Iff 


0 


R 


6 


T 


4 


V 


I 


C 


T 


0 


R 


I 


0 


U 


S 


2 


E 


E 


F 


I 


M 


0 


Q 


S 


T 


T 


5 


A 


D 


J 


U 


D 


I 


C 


A 


T 


E 


i 


E 


F 


I 


M 


0 


P 


R 


T 


T 


U 


6 


L 


A 


B 


0 


R 


A 


T 


0 


R 


Y 


5 


F 


I 


L 


N 


P 


R 


S 


T 


U 


X 


7 


E 


I 


G 


H 


T 


E 


E 


N 


T 


II 


6 


I 


L 


H 


P 


R 


S 


T 


U 


W 


y 


8 


If 


A 


T 


U 


R 


A 


L 


I 


Z 


E 


4 


L 


If 


0 


R 


S 


T 


T 


V 


_y 


_z 


--9 


T 


_W 


E 


If 


T 


Y 


F 


I 


V 


E 








Figure 39 




• 


1 

w 


• ■ • 1 -i fr - 

■ _JL 

t- t 




1 


Figure 40 



b. In the fragmentary matrix illustrated in Fig. 38 , "the number of 
occurrences of a particular letter within the matrix is proportional to 
its frequency in plain text; the letters are inscribed in a random manner, 
in order to enhance further _the security of’ the system. In Fig. 39} we 
have a modification of the idea set forth in Fig. 38 # except that the 
size of the matrix has been reduced from 26 x 26 to 10x10; in this case, 
the letters (with appropriate number of repetitions) have been inscribed 
in a simple diagonal route (lower left to upper right) within the square, 
and the coordinates have been scrambled, for greater security. In Fig.- 40, 
there is illustrated a type of cipher square which is known in crypto- 
logic literature as the Grandpre cipher ; in this Square there are in- 
scribed ten 10-letter words containing all the letters of the alphabet in 
their approximate plaintext frequencies. These ten words are further 
linked together by a 10-letter word" which appears vertically in the first 
column, as a mnemonic feature for the inscription of the words in the 
rows. ■■ 






c. The frequential-type system represented in Fig. 4la (enciphering 
matrix) and 4lb (deciphering matrix) was described by Sacco?, who pro- 
posed that the dinomes inscribed in -the enciphering matrix be thoroughly 
disarranged by applying a double transposition to -the dinomes 00-99 as a 
means of suppressing any patent, relationships among the variant values 
for the various plaintext letters; furthermore, ’the nulls incorporated in 
the matrix were to be used occasionally during the,' encryption of a mes- 
sage, in order to throw a cryptanalyst off the track, ’in this example the 
number of variant values for ^each plaintext letter has been established, 
of course, from the ’standpoint of Italian letter frequencies. 



. J* f 



^ Sacco 3 Generale Luici, flariuale^dl Critto^rafia, 3d Ed., Rome, 19 ll *7i 
22 . ... - - . 




126 



+ mm I 




REF ID : A56895 



Nulls 


A. 


E 


I 


M 


Q 


V 


one 


I18-56 


03-25 


10-35 


10-23 


39 


SO 


02-86 


44 


21-09 


52-62 


37-65 


53-75 


68 


77 




66 


76-54 


79-69 


71 -78 


82-87. 










42-12 








N 


R 


mi 


two 



64-74 

55-14 

83-90 

63-06, 

47-45 








.28 


38 


70 


97 


P 


II 


08 ■- 


17 


80 


43 



13-73 



T 

33-88 




seven 

46 



eight 

29 




Y 


four 


22 


27 


Z 


five 


34 


60-91 


59 


six 




Ok 




period 

l6-6l 



( 1 

J“ . ^ 4*- 



Figure 4la. 



_ - , 

,fwr*V * "* 1 

• 1 . . 2 3 

_ V». r t .{«r > . L * J . - 



3'*"V- 5 , 6 




F 


S 


0 


M 


Q 


E 


I 


T 


G 


P 


0 


D 



-.9 ' 


<t 


zero 


I 


eight 


Q 


M 


0 

f 


mm 


B 


z 


three 


A 


five 


A 


C 


0 


D 


U 


- 


- 


U 



Figure 4lb, 



127 








































































































REF ID: A5 68 95 



RESTRICTED 



I f s V* 



, d. The Baconian cipher described^ in par. |53a may “be used as' a basis' 

for superimposing additional complexities . _ For instance^ the' "a" elemehts 
may he represented hy any one of the 20 consonants as variants^ while _ ’ t 
the "b" elements may he .represented hy any one of the six vowels; or the f 
letters ‘A-M may he used to represent the “a" elements and the letters' 

N-Z forthe "h" elements; digits may he used for the "a" ; and "h" elemgpts, 
.either bn the basis of the” first five and last five digits, or on the* " 
basis of the odd and even digits; or the first l6 consonants (B-M) and 
the last 10 consonants (N-z) may he used for the "a" and ( "b" elements 
. with the vowelB used occasionally as nulls — thus thc.restQ.tant crypto^,,^ * 
grams will resemble those of a fairly complex cryptosystem. ‘Howler,*" 
once the cryptanalyst assumes the possibility of ( such" a system, its com- 
plexity is more apparent than real._ Similarly, variations of this genre' 
may he superimposed on triliteral systems such as the Trithemian 'cipher 1 
illustrated in par. 53b 5 variants for the "1", "2", and ,T 3” elements may’ 
he chosen in such a way as to provide a large number of equivalents " for 
ie$.ch basic triliteral jeomhinatibn. 



e. Another scheme, for a complex variant system is a summing -tr inome 
systemT In this cryptosystem, each plaintext letter is assigned a unique 
value of 1 to 26; this value is then expressed as a' trinome", the digits 
of which sum to the designated value of the JLetter . "For example, if a 
letter has been assigned the' value "4", it may be represented by any one 
of the following permutations apd’ combinations 11- : . , . _ v , : - 



ooh 


031 


vll2 


'202 


- t * * T » * ^ 

301 * , 


013 


o4o 


121 


■ 211 


310. . , _ . 


022 


103 


130 


. 220 


400 ; . , 



M ‘ * - 

• * M 

Since the values toward the middle of the range 1-26 may be represented 
by a very considerable number of surraaing-trinoraes (e.g., for tfie values 
13 and l4 there are 75 variants each), such a system would offer a crypto- 
grapher wide latitude in the choice _of cipher equivalents in enciphering, 

'! — / _ - • r - ... . . T 



A. 



^ The representations of an integer (i.e., a whole number) as the sum 
of integers in all possible ways are termed the partitions of that num- 
ber. The partitions in this subparagraph are mod 10 and also include the 
digit 0 in order to form trinome equivalents out of all the possible per- 



mutations . 






reotrioTed 



128 



REF ID: A56895 



RESTRICTED 



especially if the "basic values of the plaintext letters were chosen to 
correspond with the scale of their relative frequencies, such as the fol- 
lowing : . ' ' 



J <4 B W Y U F H D I ON S"'T' R A S L Of U'Z " 

01 2 3456789 10 11 12 13 14 15 16 17 18 19 20 21 33 23 34 25 186 37 



.. ******** SPSS*” 

‘ m&'ggumgw m 

* - - ■ m u % n u m 

• • 

• • ^ M a* * 0 * ^ * * s * * % & 



•K -* 





l T- * 

; yr.r 

~4. ^ 
(rj 
■ < <*- -v 
^ or 



..r sri * g * s? ^ ^ * “ 

? g .£ * *• ** 

- -:^ ■% * * w c ^ * m 

■ - m * % g m ?' i ^ 

f > * 3*P1fe . S’ gfgggs 

r ^■■V 5Vi k-r^^s^ 

* ‘J 1 . :V £ ±>'£ * WM% 

-* •* rtv - v* » >-*»> ■ - t; a - -’ 4 



i.T- 



, *S ■ 




r»r. 



" ' /"VvV •* ' ._> ~%£5 JfMf'n a _*»£ «.? a 5- — » „ 

The tallies beneath each valtfe' represent the number of variants possible 
for the particular value . The unused values for 0 and 27 (uniquely re- 
presented by 000 and 999, respectively) may be used for punctuation marks, 
nulls, or other special-purpose symbols. Since such a system, once sus- 
pected, would offer little difficult y^ to a cryptanalyst, certain modifi- 
cations would be necessary in order to pose any real obstacles in the way 
of solution. For instance, if the numerical value [of a letter is expres- 
sed by permutations of 3 letters ’(instead of digits') out of a set of the 
10 letters A-J wherein’ the sequence of the letters A-J represents a dis - 
arranged sequence of the digits 0-9, such a system may be among the most 
complex types of ciphers in the realm of, mono,aJphabetic substitution, 
requiring the solution of many simultaneous equations, A further refine- 
ment would involve the use of all 2 6 letters as variants, in predetermined 
groups, to represent the digits ^-9. Fortunately for the cryptanalyst, 
such systems are impracticable for field military usej but if they were 
encountered, a sufficiently large volume of text, coupled with Hitt’s 
four essentials quoted in Section I, would eventually make a solution 
possible. The/ actual crypt analytic complexity of certain apparently 
exceedingly complex cryptosystems is dependent on their being correctly 
used at all times, which is not invariably the case with military ciphers. 



, ^ 7" ' 

•' J The sblution would involve simply dividing the cipher text into 
groups of 3 digits , summing the trinomes thus produced to yield 28 pos - 
sible basic values, and solving these basic values as in any simple mono- 
alphabetic substitution cipher. 



, REBTRICTEB 



129 



-RESTRICTED 



REF ID: A5 68 95 



60. Analysis of simple examples . — a. The following cryptogram is 
available for study: 



Q 


M 


D 


C 


V 


P 


L 


F 


R 


F 


D 


H 


R 


W 


J 


W 


L 


K 


D 


K 


R 


H 


B 


P 


V 


R 


L 


T 


V 


M 


B 


K 


L 


W 


D 


W 


V 


H 


V 


K 


S. 


H 


B 


C 


L 


P 


-Q 


K 


J 


R 


V 


vr 


S 


M 


L 


K 


G 


C 


R 


R 


L 


R 


R 


K 


V 


M 


G 


F 


X 


W 


J 


R 


G 


M 


V 


VI 


G 


T 


J 


H 


Q 


K 


X 


F 


R 


Z 


V 


F 


D 


M 


L 


T 


B 


P 


L 


P 


V 


F 


L 


M 


D 


C 


N 


W 


N 


H 


B 


C 


V 


Z 


R 




L 


VI 


Q 


F 


D 


H 


D 


W 


V 


Z 


B 


R 


V 


K 


L 


C 


V 


C 


V 


R 


D 


H 


L 


R 


V 


T 


L 


F" 


R 


C 


D 


K 


G 


M 


X 


VI 


X 


M 


D 


T 


S 


C 


B 


C 


L 


Z 


L 


R 


L 


M 


V 


T 


9 


Z 


N 


K 


9 


VI 


V 


P 


B 


R 


R 


C 


L 


R 


X 


R 


D 


C 


N 


K 


V 


P 


B 


T 


R 


T 


G 


H 


J 


Z 


L 


F 


Q 


F 


V 


K 


B 


w 


D 


Z 


X 


P 


R 


H 


S 


P 


G 


H 


L 


K 


L 


F 


V 


Z 


L 


T 


V 


M 


L 


K 


D 


P 


Q 


R 


i/ 


Z' 


L 


z 


D 


T 


B 


M 


R 


T 


G 


M 


N 


Z 


V 


F 


X 


K 


9 


F 


D 


C 


L 


Z 


V 


T 


V 


F 


D 


F 


V 


R 


G 


c 


L 


P 


Q 


P 


R 


C 


D 


W 


V 


R 


J 


T 


R 


H 


L 


Z 


L 


M 


V 


W 


R 


P 


V 


P 


D 


Z 


D 


VI 


J 


p 


R 


W 


L 


R 


J 


X 


V 


M 


X 


M 


D 


T 


9 


M 


G 


F 


D 


R 


D 


K 


L 


W 


J 


F 


L 


P 


J 


¥ 


' § 


F 


Q 


VI 


B 


F 


R 


c 


B 


Z 


D 


K 


V 


VI 


G 


Z 


S 


H 


B 


H 


D 


H 


J 


C 


X 

































The first thing that strikes the eye is the total absence of vowels , re- 
markable not only because six letters are missing (cf. the A test) in a 
text of this size, but also' because all six of these letters fall into 
an identical limited category — a significant non-random phenomenon. Since 
a uniliteral substitution alphabet with six. letters missing is highly 
improbable, the conclusion of multiliteral substitution is obvious. 

Upon closer inspection it is found that, if the cipher text is divided 
into pairs of letters, only ten consonants (BDGJLRQSVX) are used 
as prefixes, and the remaining ten consonants (CFHKMPRTWZ) are 
used as suffixes --thus the biliteral (and bipartite ) characteristics of 
the cipher text are disclosed. A dlgraphi'c? distribution is therefore 
constructed: - • 





c 


F 


H 


K 


M 


p 


R 


T 


W 


z 


B 








^ 1 




s=r 






cs 




- ‘ D 


5 






g 


_ 




_ 


=x 


S 


rr 


G' 


r= 


ss 


S3 




5 












J 




_ 


|B| 






_ 


sa 






_ 


L 


. 


77 






gr 






5= 


ssi 




, R 


==■ 




s 


H 




, . 


j ^ 


S3 




H5 


' Q 




■a 




sr 




_ 






. 




, . s- 




- 


S3 




rs 


— 








__ 


r 


_ 


§ 




a 


= 






= 




•55 


X 










ss 






1 







\ If it had not been noticed that the cryptogram should be divided 
into > pairs for analysis, a biliteral distribution (see par. 23d) might 
have vjpeen made, in order to reveal contact affinities of the cipher let- 
ters . 



RESTRICTED 



130 




ItEOTIlICTEP 



REF ID.: A5.S8 95 



L • 

- , ■ ^ , r , -*■ - . J- - ” i — * '* 

' r . ,b. It is possible that the cryptogram under study may involve the 
use of a small enciphering matrix with variants for the rows and cblumns . 
Sine?, there is available an easily-applied special solution which permits 
the determination of the row indicators which are equivalent (i.e., inter- 
changeable variants) and the column indicators which are equivalent, mere- 
ly from a study of the digraphic distribution, this possibility is examin- 
ed. The special solution is based on the following considerations: in a 

■ message of moderate length for such a cryptosystem, it may be assumed 
that the various possible/ cipher pairs for a /given plaintext letter will 
' be used with approximately equal frequency; for this reason, the cipher 
letters which pair with one of the letters used to indicate . any particular 
- row jDf ,thq„, enciphering matrix may be expected to pair equally often with 
any other cipher letter which has been used .to indicate the, same, row, (and, 
of course, the same is _true. concerning the,, column - indicator letterr). . 
Thus, in the digraphic distribution, of such. a cryptogram, .sets .of rovus 
appear which have similar "profiles" and, likewise, sets of similar col- 
umns. 7. First, a study will be .made of th^ ^oys^of the. distribution just 
compiled^ in an attempt to. .locate, and, isolate tiioge 3 /hich match . with each 
‘ "other;" then, 'the same will be done with the columns of the distribution. 

c. It is noted that the "L" and. "V" distributions have pronounced 
similarities (Fig. 42a) — these rows came 4, under consideration first because 
of their unique "heaviness" of their frequency characteristics. Likewise, 
the "D" and "N" rows have homologous attributes in their appearance (Fig. 
42b) , However, the further grouping of the rows by ocular inspection may 
. present difficulties to the student, since b-s may not yet trust his eye 









»— ■ 






% 




3. 




— 


s 


— 


s 






= 


31 


3 


ir= 



Figure 42a. 



• *■ 1 " ' * — ■ 

<« ^ l ' I'-' 



i* i ; 



D 



N 




- Figure 42b . 




in matching distributions; and he may feel the need for some kind of 
statistical assurance. In the following subparagraphs there is given the 
technique of a more precise method for matching, mathematical in nature. 

. . , #1 . 4 . 4 - 4 - I * * ’4 '« r 

7 — - * - 

1 These similarities are especially pronounced when the encipherer 
uses a "check-off" procedure for choosing his variants for each letter, 
that is, when he systematically "checks off" the variants used during 
encryption to instire that all possible variants are used in approximately 

equal proportions . 



REOTRICTEP 



■ 131 



REF ID: A5 68 95 



RESTRICTED , 

d. This method of. matching in an attempt to ’’equate" interchangeable 
variants involves computing a separate value for each trial matching of 'a 
particular row (or column) against each of a series of other rows (or 
columns, as appropriate) — such a value is taken as an indication of the 
"goodness of match" exhibited. by the particular trial, the theory being 
that the correct match- wj.ll produce the highest value.® -The value for a 
particular trial match is computed by multiplying the number of tallies 
in each cell of ope row :(or column) by the number of tallies in each cor- 
responding cell,, in the other. t row (or column) and then totaling the pro- 
ducts thus obtained,/, Because. ,6^ the way in which it is produced, such a 
value is termed a "cross -products, sum" . . , .mi— - 

"e'.' "In’ subparagraph 6 above’, it’ was determiriad that the "L” and "V" 
rows wefe equivalent,’ and that ’theV'D" and "W" rows also formed an equiv- 
alent pair. The next* "heavy" row is the "G" rowj' r tfii.6 is xo be tested" 
for match with the five remaining 'unmatched rows !,' Let the *"G" row be 
tested first ’against the* "B" row. tnese two rows are given below, with 
their cross-products Sum. ’ For convenience, the cross-products sum is 
symbolized by ?^(© 1 ,0 2 ), where ' ©1 and 02 represent jfche designators of the 
distributions to be matched. 9 * ' 

.jf r» — I < "« •- t » i . « * ^ 

i\ . "G'V 2 2 2 - u -3 - - 1 - 1 

- ■■ *-"B" : 3111122121. 

^ (G,B) : 622-3--1-i = 15 r 

P T / vJ. , , * . . ^ _ ‘ * r * XS 1 • • • • X * • - *** S \ i ' 

The complete table^pf the comparisons of the.. "G" ..row with .the five .avail- 
able rows is as follows : 



6 2 2 - 3 - - 1 - 1 ? 15 

2 2 2 - 3 - - 1 - 1 : 11 

_ 4 - - 3 - - - r r - = 7 

2 4 4 - 6 1 = 17 

- 2 - - 6 '-=8 

The results indicate that the most probable match with the "G" row is the 
"S" row. 



X (G,B) : 

xM* 

j|r(G,Q) : 

% G,S : 
^(G,X): 



f . Since, the next "heaviest" row to be tested is the "B" row, its • 
matchings with the .three remaining rows are made, and are given below: 

^(B,J): 311112412 l r 17 
X (B,Q): -2-2122 - 2*1 - 12 
X (B,X): -1-1222-4-= 12 






* , Nr f » "f fc - r * : ~ /ft » •• 



(J • 

0 In this connection, note 

. , vi • j 

° The Greek letter ^ (chi) 
matching operations. 



the considerations treated in^ubpsr . 60 ^. 
is often \tsed in cryptology to symbolize 



l 



» ii 



■ I r.* - 1 j ■ - j , * - r *4 -' ' 

■* H.r u 1 . Tf r - f '»* I . 






RESTRICTE D 



132 



REF ID : A56895 



RESTRICTED 



The correct matching, of the "B" and " J" rows is indicated by the results » 
This leaves only Hie "Q" and "X" rows , which are presumed to go together, 
since not only is their cross-products sum satisfactory (when compared to 
the % values Tor some of the other rows which have "been matched), "but, 
equally important, their patterns of crests and troughs are similar* 

Since we have not found more than two rows for any one set of inter- 
changeable values, ifc appears that the original matrix hadonly five 
rows, with two variants for each row. The rows, of the distribution dia- 
gram are therefore combined in the following diagram: 



CFHKMPRTWZ 
BJ 
DN 
GS 
LV 
.QX 



4 22223 4 232 

82872225 7 5 
344 - 51 - 1-2 
2817789677 
-3-3322-3- 



Figure 43 

g. Analysis of the distributions of the columns of Fig. 43 quickly 
reveals that columns "C" and "H" may be matched as a pair, and likewise 
columns "F" and "M”, and columns "P" and ,T R" . In order to decide the 
groupings of the remaining columns, the six possible V values are der- 
ived: 



*(K,T): 


4 


35 


- 42 - = 


81 




Combinations : 






4 


49 


- 49 9 = 


113 


KT, 


WZ: 


81 + 90 = 


171 


i(K,Z): 


4 


35 


- 49 - = 


88 


KIT, 


TZ: 


113 + 73 = 


186 


J(T,W): 


6 


$5 


’-"42 - = 


83 


kz; 


T If: 


88 + 83 = 


171 


£(T,Z): 


4 


25 


2 42 - = 


73 










jc(W,Z): 


6 


35 


- 49 - s 


90 


» \ 


_ 




, . 




_ r . 



I h. The groupings of the columns having been determined, the fre- 
quency diagram is reduced to its basic 5x5 square, and the $ test is 



II 








C • F K P T 
H M W R Z 


BJ 


6 4 5 7 4 


DN 


16 4 14 4 3.0 


GS 


7 9-13 


LV 


3 15 l4 17 13 


qx 


- 6 6 4 - 



4 p =1962 

$r=H32 

4 . 0=1670 



taken as further statistical '.assurance of the matchings. Although 4> 0 in 
this case does not come up to the best expectations, we feel nevertheless 
that the matching has been carefully and correctly accomplished, and so 



K-'l 



RESTRICTED 



133 




REF ID: A5 68 95 



ItEQTRICTED 

the next step is continued with a conversion of the multiliteral text 
into uniliteral equivalents, using the following reduction square con- 
taining on arbitrary sequence: 





C 


F 


K 


P 


T 




II 


M 


W 


H 


Z 


BJ 


A 


b' 


C 


D 


E 


BN 


F 


G 


H 


I 


K 


GS' 


L 


M 


K 


0 


P 


LV 


Q 


R 


S 


T 


U 




V 


W 


X 


Y 


Z 



The converted cryptogram is now easily solved^ using the principles set 
forth in Section VI. The first fifteen letters of the plaintext message 

are found to read ‘LEATHER FORECAST ", and the original enciphering 

matrix is recovered, based on the key word ATMOSPHERIC, as follows: 





p 


F 


C 


K 


T 




R 


M 


H 


W 


Z 


• J LV 


A 


T 


M 


0 


S 


-f-i J n 


P 


II 


E 


R 


I 


« BJ 


C 


B 


D 


F 


G 


GS’ 


K 


L 


K 


Q 


U 


ox 


V 


W 


X 


Y 


Z 



* ■ — • 

i. The method of matching rows and columns just described in the 
preceding subparagraphs applies equally well to all the matrices in Figs . 
26-35, and similar variations. If in the process or equating indicators 
the cryptanalyst" sees that the row Indicators ore falling into the same 
groupings as the column indicators, he might be able to accelerate the 
equating process by taking advantage of this feature alone, as would be 
the case if he had encountered a cryptogram involving a matrix with .indi- 
cators arranged in a manner similar to that shown in Figs. 29 and 30. 
Furthermore, a cryptogram enciphered in a commutative system, wherein 
the equivalents have been taken in row-column and column-row order indis- 
criminately, may be recognized as such through a study of the digraphic 
distribution of the cryptogram since the " <* " row of the distribution / 

will have an ajjpearance similar to the " «* " column, the " P " row will j 

be similar to the " P " column, etc; 10 this matter is discussed further in 
subpar. 6ld. 1 • 



10 It is often convenient to use arbitrary symbols in cryptanalytic 
work, to prevent confusion with designations of actual elements of plain 
text, cipher text, or key (see footnote 1 on page 58) . For this purpose 
Greek letters ore often used^ for reference, the 2 H letters of the Greek 
alphabet and their names are 'appended in the chart belov: . ( 



A alpha 


E g epsilon 


I u iota 


hi *r nu 


P p ro 


<p f Phi 


13 p beta 


Z C zeta 


K i< kappa 


31 t xi 


€. c r sigma 


X ^ chi 


r gamma 


H eta 


A ^ lambda 


O «. omicron 


T -c tau 


V f psi 


A £ delta 


0 $ theta 


A\ f *. mu 


H -rr Pi 


T v ypcilon 


jTL co omega 







- REE -ID: A5 68 95 



, RESTRICTED 

t 



.c 



It to important to point out that in matching, the ci-yptanalyst 
should begin with the "host’' rows or columns — hoot not. only from the 
standpoint of "heaviness”, of the distribution, but also best from the 
point of view of a distinctive pattern of crests and troughs. If insuf- 
ficient text is available to allow equating all the interchangeable 
coordinates of a particular enciphering matrix, it may still be possible 
that a conversion of the cipher text by moans of a partially-reduced re- 
construction matrix may yield enough idiomorphic patterns and other data 
to make possible an entry into the text. If the .cryptographer has not 
used a "check-off" process in enciphering, but instead has favored certain 
equivalents for the various plaintext letters, matching may not be pos- 
sible; nevertheless, an entry into the text may be facilitated in this 
case, because some of the resultant peaks in the cipher text may be cor- 
rectly identified. Furthermore, since no variant system can possibly 
disguise the letters of low frequency in plain text, their low-frequency 
equivalents in the cipher text may provide possible approaches to solu- 
tion. (See also subpar. 6 le) . 

k. In addition to the method of solution by matching and combining 
rows and columns of a digraphic distribution of a multiliteral cipher, 
there is also the general approach applicable without exception to any 
variant system. This method, involving the correlation of cipher elements 
suspected to be the equivalents of specific but unknown plaintext letters, 
is treated in detail in paragraphs 6 l r and 62. 

l . Systems such as the Jl— level dinome cipher illustrated in Fig. 36 
are susceptible to a very easy solution, if the dinomes have been in- 
scribed in numerical order ?>*• ,v »dicated. .Assuming such a case in a 
specific cryptogram, thfe first six groups vC which are 



68321 09022 u 4 8057 65111 88648 42036 .. 

a four-part frequency distribution, of, the. entire message, is taken as 
illustrated in Fig. 44 - below: - * - ^ 

_ - - - t i _4 * i,"*' < * ’ 

‘ . - ' _ 

01 02 03 64 ol 8 07 08 09 5 il 13 14 15 .16 17 S 19 20 21 £ 23 24 25 

. . - - t . ' ••• -j* 

• w + 

m fc - - 

= _ ~ __ ’=? l_' ^ ijr 5 ' == ^ ^ 

26 27 28 29 30 $i- 32-^33 34 ^5 36 37 38 39‘4o 4 i 42 43 44 45 46 4-7 48 49 50 

k »r , 14 « * * ■* ’ ■* • m \* 1 , * 



-- r- 1 * - 

“ ** t t- ~ 



• > . ■ • • * 1 *i ' 



51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 1 68 69 70 71 72 73 74 75 



76 77 78 79 80 81 82 83 84 8 86 87 88 89 90 91 92 93 94 95 96 97 98 99 00 

Figure 44 . 



1 



REOTRICTEB - 



135 



REF Id : A56895 






RE S TRICTED 

j If the student will bring to bear upon this problem the principles he 
learned in Section V of this text, he will soon realize that what he' now 
/ has before him are four simple, monoalphabetic frequency distributions 
similar to those involved in a monoalphabetic substitution cipher using 
standard alphabets . The realization of this fact/ immediately provides 
the clue to the next step: " fitting each of the/distributions to the , „ 

normal”. (See par. 31 ) • This can be done without difficulty in this 
case (remembering that a 25-letter alphabet is /involved and assuming that 
I and J are combined) -and the following alphabets result: 



-01— I-J 


26— U- 


51— N 


76— E 


02— K 


27— V 


52—0 


77— F 


: 03— L 


■28— W 


53— P 


78— G 


■ 04— M 


29— X 


54— Q 


79— H 


05— N 


30— Y 


55— R 


80— I-J 


06—0 


31— Z ‘ 


56— S 


81— K 


07— P 


32— A 


57— T 


82— L 


08— Q 


33— B 


58— U 


83— M 


09— R 


34— C 


59— V 


84 1 -r-N 


: 10— S 


' 35— D 


60— W 


85—0 


' 11— T 


36— E 


61— X 


86— P 


12— U 


37— F 


62— Y 


87— Q 


13— V 


38 — G 


63— Z 


88— R 


14— W 


39— H' 


64 —k 


89— S 


. 15— X 


40— I-J 


65— B 


90— T 


16— Y 


41— K 


66— C 


•91— U 


17— Z 


42— L 


67— D 


92— V 


18 — A 


43 — M 


68— E 


93— W 


19— B 


44— N 


69— F 


94— X 


20— C 


4.5—0 


70— G 


95— Y 


21— D 


46— P 


71— H 


96— Z 


22— E 


. 47— Q' 


72— 1-J 


97— A 


23— F 


48— R 


73— K 


98— B . 


24— G 


49— S 


74— L 


99— C 


25— H 


60— T 


75— M 


00— D 



The key word is seen to be JUNE and the beginning of the cryptogram is 
deciphered as "EASTERN ENTRANCE " 

m. If instead of 25-element alphabets, a system* such as that in 
Fig • 37 has been used, only a slight modification yf the procedure in 
subparagraph would have been necessary, i.e., ^he' distributions would 
have had to be considered on a basis of 2 6, and the process of fitting 
the distributions to the normal would have gone on as in the previous 
example * . 



RESTRICTED 



-136 



REF ID: A56895 



RESTRICT KB - 



nr.u - E" a 1 : 



n. . One further application of principled learned in Section V, .de- 
served to "be mentioned here, in connection With the solution of systems 
such as those of Pig. 36 . Let the following short message "be considered: 
lV -ii . -*• r { ' ‘ • * - * «Tl±i£P.i, 

4 8 g'YS' 8842 3 52099 9360 4 7 6 059 05651 

36683 "52 267 97 11 4 5446 r 6 76 

kl .. , 1 *’^ >r *1 r> 7 TT.rT. V* h ~ ^ v, •* ^ * ; 

If ib is ,known bhat’the' correspondents have been using a variant system 
such as- that in Pig. 36 ,. a special solution. may he employed, in those cases 
wherein there is insufficient cipher texb to permit ( analysis by the method 
of fitting the frequency distribution to the normal]. Thus, a' short cryp- 
togram may he solved hy a variation of ^he plain-component completion 
method described In par. r 34.H First, let the cryptogram be copied in 
dinomes', With an indication o’f the level (l.e., the; "alphabet" ) the di- 
nome Would ’occupy in thfe 4-level matrix; thus: 

, ; . . k ■ ■.,* .. J /-*■* r J • -• *' : 

48 22 68 84 23 52 09 99 36 04' 76 05 go 56 ~51 36 68 35 22 67 97 11 45 44 66 76 



2 1 
T T 



141433232 

“T ■*' . , . ” 



1 3 4 1 2 2 3 

. 1 i » *% % 

« i n -- * ■ 



1 - ij .« * 

I., * 4 15 

,U. 1 j •• #/ ^ 



2 1 34 1 3 1 

< • Si ; 

The dinomes' belonging to the four levels are as follows: 

x. - £* * v ; 2- - ■ .’V * L t . * '-*»'* [ 1 1 * 

- r.(l) 22 23 09 04 05 22” 11 * ** ” ’ ’ 

1 (2) 48 36 36 35' 45 44 

(3) 68 52 56 51 68 67 66 

.. . (it) 84 99 7 6 90 97 76 ' . . 

.... - * ■ . . A ' li. i * * - // ■'<- 

, . , _ - - » A JW " . . 

These dinoines are' converted into terms of jbhe plain component by setting 
each of the cipher sequences against the plain component qt an arbitrary 
point, of coincidence, such ''as in the following example : 

; a. ; ‘1 -* I 1 /*- '* ‘ 

A B C D E F G H 3?- J K L M _ W 0 P Q. RSTUVWXYZ 
01 ’ 02 • 03 • 04 05 06 07 08 09' io 11 12' 13 14 15 16. 17 18 19 20 '21 '22 23 24 25 

26 27 28 29 30 31 32 33 34 35 36 -37 38 39 4o 4l 42 43 44 45 46 ¥7 *18 49 50 

51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 

76 77 78 79 80 81 82 83 81; 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 00 



* # 

( 2 ) 

(3) 

(4) 
*) > - 



-22 iff;' 


23=X; 


09=1; 


04=D; 


05=E; 


224,1; 


' : 11=L ' 


■ " ^ 


48 =X; 


36=L; 


36=L; 


35=K; 


45=U; 


41|=T 






6 8=S; 


52=B; 


56=F; 


5l=A; 


68:S; 


6 7=R; 


66-q 


' V 


-2W»: 


. 99=Y; 


76=A; 


90 =P; 


97=W; 


T6zA • 


■ 


* 



•! J 



CT.iLT? 

t . - 



r jr :V 



\ »>* 1 






• :or. 



’ It should be clear to the student that the reason this method epu be 

applied in this instance ' is that both the plain component (ABC Z) and 

the cipher component ( 01 , 02 , 03 25 ; 26 - 50 , 51 - 75 i 76 - 00 ) are known 

sequences (or thus assumed) . 



I 

1 



ttEOTRICTED 



137 




REF ID: A5 68 95 



d vx 



RESTRICTED 



. o* , .Thf; plain component sequence is now completed on the letters of 
the four levels, as follows: • . . . •- .* ' ‘ - ■ ■ ■ > 



1 st level 

W X I D E W L ‘ 
X Y K E F X M 

Y Z L F G Y N, 
Z'AM,QHZp ' 
A B N H I A P.y ‘ 
B C 0 I K B Q* 
cpp x i.c ■ 
D E QL'M'DS V, 
E F R M.lf E T ’ ’ 
F G S N 6 F U ” 
GHTOPGV 

H I U P Q H W 

1 X, V Q R IX 

KLWRSKY 

LMXSTLZ 

MNYTOM A’" 

NOZUVBB 

OPAVWOC 

PQBVXPD 

QRCXYQB 

RSDYZRF 

S T E Z A S G 

TOFABTR 

uif GBC U I., ! 

V W H C D V K 



2 d level 

XLLKUT 

YKMLVU, 

.ZHHHfL 

. a °-q ■ 

BPPOYX;,, 
?c Q Q P. 2,.J. ... 

MS a Z . . 

E p S R B A. 
FT T S.C B . 
‘G^UTDC 
HVVUED 
IPV.F.E 
K X X W G F 
L Y Y X Pi G 
M Z.Z Tf.J H. . 
N A A Z IC I 
0 B B A L K 
PCCBHL 
QDDCNM 
R E E D 0 E 
S F F E P 0 
T.P GFQP, 

u h,h g.r q 

V I I,I}S R 
W K K ITS 



... - 4 . » ■ 

3 d level 
* s - * .* 

SBFASRQ 
TCGBTSR 
UDiqUTS 

„ .y, E idvut 

.. W ..F K. E W V B . 

X Ct L F .X W V 
,,.Y.H M,G YXK. 

Z jE ,H B Z Y X . 
. A K.0LJ.AJB Y 
P L P KB A Z 
CMQLCB A 
, DJ.RHPCB. 
EOSHED'Q 
F P T 0 F E D 
G QUP^G F.E . 
II R V Q H G F 
I S' W R I H G_ 
K T X S K I H 
LUYTLKI 
M V Z U M L K 
H W A V N M L 
0 X B W 0 N M 
p’y C X P 0 a... 
q z p x ft p .0 

R A E Z R 'QP 



i * « , 1 r «. ■ 'i ' ■ 

4th level 

• t* . ‘ T 

I Y A P W A 
K Z B Q X B 
L A C R Y C 
HBDSZD 
N G E T A E 
■ 0 D F U B F 
. P E G V C G 
QFHWBH 
•RGIXEI 
SHKYFK 
T I L Z G L 
U K M A S M 

V L H.B IH 
IT M 0 C X 0 
YBPDLP 

Y 0 Q E M Q 
.ZPRFMR 

AQSGOS 
BRTHPT 
C S U I Q U 
DTVKRV 
E U W L S W 
. F.VXMTX 
GWYBUY. 
H X Z 0 V Z 



I , It is seen ^hat the , generatrices with the "best assortment-^ of high- 
frequency letters for the four levels are: . , 

1 st level .. 2 d level 3 d level l ■ -./ 4 th level 

EFRMHET -REdEDOH. E.OSNEDC. 8 C E T A E 



* . . - r , 

, r - . r . . ' - . • bi w ■?. • ^ 

In evaluating generatrices, the sum of the arithmetical frequencies 
of the letters in each row may he used as an indication of their relative 
"goodness". A statistically much more accurate method of evaluating 
generatrices involves the use of logarithms of the probabilities of the 
plaintext letters forming the generatrices . (See also footnote 7 on * 
page 89 ..) . -- * 



RESTRICTED * 138 ‘ 




■'REF ID: A5 68 95" ‘ 



i r. | i 



If the lcttci'6 of these generatr 
ancc of their, (Jinpme equivalents 
various levels. 



!=■■£»* r v ■ 1 r « '« * , J - j 

% generatrices arc arranged in the order pf appear- 
juivalents, according to the way they* ’fall" into the 



48 22 68 Oh 23 52 09 99 36 04 76 05 90 5 6 51 36 68 35 22 67 97 ll 45 44 66 7 6 



E I? . _ R . M N , E T 

R E E D .'OR 

E. 0 ...... . S N . E D . C 

N C E T . , *A E 



the plain text "REEKFORCEIvIEpiTjS HEEDED AT ONCE" is clearly seen. Or, more 
simply, IT we examine the equivalents of 01, 26, 51, and 76 after the 
generatrix determination has teen made, the key word JURE is revea,led. 

If an error, had been made in the /selection of a generatrix, the error 
could he resolved hy hypothesizing the probable key word, or by decipher- 
ing the text' on the basis of the as siuned diagram and then noting and 
“degarbling’ tlie systematic errors (which, it would be noticed, all come 
from one level) . - *- * 1 •* 

1- - «-»*"• *• i.. 1 .' r ; _ ■ . ■ . . . .! • j'i ; ,n- 

■ 2* The student should note that no one generatrix will yield plain 
text all the way across as in the example in par. 34. Instead, the 
generatrices must be considered separately for the four levels, since it 
‘Is. within each of the four level’s "that there is a homogeneous relation- 
ship of dinomes. Obviously if dinomes from mofe than one level were used 
to complete* the plain component sequence,' the generatrices would not con- 
sist’ of a - homogeneous 'group of letters but*i"ns'tead would represent an. 
assortment of" letters ’ from tiro : or more "alphabets" . 

61. Analysis of more complicated examples , — -a. As soon as a begin- 
ner in cryptography realizes the consequences of the fact that letters 
are used ‘with greatly' varying ‘frequencies, in normal plain 'text, aTbril- 
liant idea very speedily comes^to him/ Y7hy not disguise 'the natural fre- 
quencies of letters lay a system of substitution using many'equivalents , 
and let the numbers of equivalents assigned to the various letters be 
more or less in direct proportion to the. normal frequencies jbf the let- 
ters? Let E, for example, have 13 equivalents; T, 9) N, 8; etc., and 
thus (he thinks) the enemy cryptanalyst can have nothing in the way of 
telltale or characteristic frequencies .to use as an entering wedge. 

b. If the text available | for ' study is “small in amount and if the 
variant values are wholly independent of' one another, the. problem can 
become exceedingly difficult. But in practical military communications 
such methods are rarely encountered, because the volume of text is usually 
great enough to permit of the establishment of equivalent values . To 
illustrate what is meant, suppose a number of cryptograms produced by 
the monoalphabetic -variant method described above show the following 



139 



REF ID : A568 9$ 

RESTRICTED 

1 *' * 

two sets of groupings.!^ of cipher elements in the text. Set "A" "be la# 
assumed to he different representations of one particular underlying 
plain text, and Sot "B" assumed to he representations of another under- 
lying plain text: 

Set "A" Set "B" 



( 12-37-02-79-68 -13 -03-37-77 ) 
(82-69-02-79-13-68-23-37-35) 
(82-69-51-16-13-13-78- 05-35) 
(91 -05-02-01-68 -42-78-37-77) 



(71-12-02-51-23-05-77) 

(11-82-51-02-03-05-35) 

(11-91-02-02-23-37-35) 

( 97 -12-51-02-78-69-77 ) 

to the following tentative 
'its : . 



An examination of these groupings would lead 
conclusions with regard to prohahle equivale 



(12, 82, 91) (02, 51) (13, 42>, 68) (35, 77) 

(05, 37, 69) (01, 16, 79) , (03, ,23, 78) (11, 71, 97) 

The eotahlishment of these equivalencies, would sooner . or later lead tp 
the finding of additional sets of. equal values. The completeness vith , 
which this can he accomplished will determine the ease or difficulty of 
solution. Of course, if many equivalencies can he established the prob- 
lem can then he reduced practically to monoalphabetic terms and a speedy 
solution can he attained. — ' 



c. Theoretically, the determination of equivalencies may seem to he 
quite an easy matter, hut practically it may he very difficult, because 
the cryptanalyst can never be certain -that a combination showing what 
may appear to he. a variant value is really such and cLop§. not. represent 

a part of a different plaintext sequence. ..For. example, take the groups — 

17 -82-31-82-14-63, and 
: : 27-82 Jl0-82-l4-63 

Here one might suspect ,that 17 and 27 represent the same letter, 31 and 
40 another letter . But it happens that onq group represents the word 
MANAGE, the other DAMAGE. There are hundreds of such c.ases in English 
and in other languages . , _ 

d. When fdverSibie combinations are used as variants, the problem 

is perhaps a hit more simple. For example, using the accompanying Fig. 45 

* tmi r * ■ 



■ .. W,S Jt H A__0 E_ 

F,X _D T M F P_ 

. . ■ G, J _0 B U I V_ 

• ,r C,N _G X R C S_ 

E,T b I L Y 1 W K 

" > * f 

Figure 45 

13 T}i je alert student night he able to determine the underlying p] ain 
text of the two sets c'.’ ciphertext gi’oupingc. 



K,Z Q,V B)H M,R D,‘L 



H 


H 


A 


0 


E 


D 


T 


H 


F 


P 


0 


B 


U 


1 


V 


G 


■«r 

A 


R 


c 


S 


b 


L 


Y 


V 


E 



l ’:0 



RESTRICTED 




REF ID: A5 68 95 



^ ItEOTRICTED ■- 

for' enqiphcrmpnb, two messages with the same initial words, REl'llRENCE ■ 
YOUR, may he f pnoiphored^as fqllows,: . . . „ v ■■ . . .> 

_R E " F E R E ‘ N r C EY OU R 

(1) N II W 13 H X L S II C D W W Z N R S L II P S R B J 0 H 

(2) CHDWRXSLHN D W Z W N R L S II P R W J BN H 

f ’ - ■ * - ■ 

The experienced cryptanalyst, noting the appearance of the very first few 
cipher groups, assumes that not only have the messages identical beginn- 
ings in their plain texts, hut also that he is here confronted with a 
variant system involving biliteral reversible equivalents. One of the 
manifestations of such a cryptos'ystem ‘is that in the digraphic distribu- 
tion of the cipher text the "B" row will have an appearance similar to 
the "B" column, the "C rt row iri.ll resemble the "C" column, etc . ; thus , 
the cryptanalyst will almost immediately realize that he has encountered 
a commutative system involving a matrix smaller than that indicated by 
the size of matrix necessary for' making the digraphic distribution. 

e. The probable-word method of solution may be used, but with a 
slight variation introduced because of the fact that,' regardless of the 
system, letters of low frequency in plain text remain infrequent in the 
cryptogram . Hence, suppose a word containing low-frequency letters, but 
in itself a rather common word strikingly idiomorphic in character is 
sought as .a "probable word"; for example, words such as CAVALRY, ATT ACK, 
and PREPARE, Such a word may be written on a slip of paper and slid one 
interval at a time under the text, which has been marked so that the 
high- and low-frequency characters are indicated. Each coincidence of a 
low-frequency letter of the text with a low-?raquency letter of the •« - 
assumed word is examined carefully to see whether the adjacent text let- 
ters correspond in frequency with the other letters of the assumed word; 
or, if the latter presents repetitions, whether there are correspondences 
between repetitions in the cipher text and those in the "word. Many trials 
are necessary but this method will produce results when the difficulties 
are otherwise too much ^ for ^the_ cryptanalyst .to overcome; >■- 

->■» r i i-> i J,il — .• -v-iV ..4. ^ * - i •i r ; >'7 X „!V_ — “ ‘ * ' ’ "~ c ~ ' 

62. Analysis involving the \ise , of j sglogs — a. In military communi- 
cations it is not unusual that cryptograms are prpduced containing identi- 
cal plain text but which have been subjectedto different cryptographic 
treatment, thus yielding different cipher texts. This difference in cryp- 
tographic treatment may be caused by the use of .an entirely different 
general system, or by the use of a different" specific key, or merely by 
the choice of equivalents in a variant system. "Messages which present 
different encrypted texts but" which contain identical plain text "are 
called isologs (from the Greek iso ’= "equal" ‘and logos = "word"). One of 
the easily-noted indications of the ^possible presence of isologs is 
equality or near-equality in the lengths of too (or more) cryptograms. 
Isologs, no matter hear the cryptographic treatment varies, are among the 
most powerful media available to the cryptanalyst for the successful 
solution of a difficult cryptosystem — and, in some cases, may provide the 



l4l 



REOTIUCTED 



-• r - 




REF ID: A5 68 95 



- RESTRICTED * ■" 

only possible entries into a complex cryptosystem. An inkling of the 
help afforded by isologs was revealed by the example contained in sut^’oT 
6ld above; however, a much more striking illustration is given in the 
next few subparagraphs. - 

b. The following two cryptograms, suspected to be isologs, are 
available for study: ... , . *,♦- 



Message "A" 



82265 
8 0 2 7 7 
6 3 6 2 9 

8 17 13 
38728 
89697 
2 8 12 0 

9 0 8 7 0 
46729 



6 3 


1 


r if 

0 3 


■ 7 4 ' l 3 


9 


6 


9 8 4 2 


8 9 


i 


0 6 


..9 4 


0 


0 


0 


, 1 


3828 


3 3 


9 


l 8 


4 3 


1 


5 


8 


8 


1 0 4 8 


5 2 


5 


3 8 


7 3 


3 


0 


9 


2 


0749 


9 1 


1 


4 7 


9 9 


9 


2 


6 


4 


14 6 8 


9 3 8 


1 6 


5 1 


7 


5 


0 


_5. 


.7 0 7.. 4 


2 7 7 


3 0 


3 l 


1 


9 


9 


7 


9 9 6 2 


4 0 


867 


4 6 


5 


9 4 


1 


9 8 5 5 


3 6 


2 


4 5 















3 2 5 2 9 
5 4 0 8 2 
2 6 4 5 8 
61752 

13 3 6 
118 0. 
2786 
1 0 C 2 



5 

.4 

5 

2 



7 0 115 
4 0 0 6 5 

5 0 3 9 

6 4 7 6 
3881 . 
3 2 5 5 

0653 

2987 . 



Message "B” 



3 0 15 0 

4 5 6 4 7 
90628 
3 5 19 9 

3 8 4 6 3 
26121 
0 6 4 8 k 

4 4 10 5 

59682 



87497 

9 9 18 1 
7 7 5 3 6 
9 0 13 8 

1 7 5 4 7 

83878 

3 2 10 3 

5 2 9 0 -0 

4 6 2 5 3 



14 5 11 
6 9 6 7 2 
2 0 3 5 1 
9 9 9 7 4 
1 4 6 4 8 
9 4 8 8 9 
9 8 7 1 5 
5 9 7 2 8 



97360 
5 3 8 8 9 
0570 
0 2 3 2 
0 6 4 6 
3 7 2 8 

2662 
2855 



4 9 6 7 6 
41563 
89277 
0 4 1 1 5 
8 5 8 6 4 
112 7 2 
80760 
87300 



5 0 1 6 6 

25203 

7 5 0 1 1 

89216 

5 3 8 9 8 
2 0 5 0 4 
89880 
70893 



On the possibility that some diname system (or systems) is involved, the 
messages are written under each other in dinomes to facilitate the exam- 
ination of the* similarities and differences of such a grouping of the 
cipher texts, as sftown on the next page: 11 



-*• iv. - . *■ ; • . 

_ _ » » # * * * 

1 . ' j r -3 - a '• - "* r- 

fc* ‘ 1 * L. t *1 f * 

« ' ; * ■; > - 
- *;• ,■'-*< • I 

- ‘ - 

- ./ * ' e “ ' - 



* m ‘ w t A 



_ , .if % t «* 



- RESTRICTED 



142 



t » k 



REF ID : A56895 



RESTRICTED 





1 


*■ 


• 


. • < 


■'5 










10 










15 


A 


82 


■26 


56 


31" 


03 


74 


83 


96 


98 


42 


32 


52 


97 


01 


15" " 


A* 


3°' ' 


■15 


08 


74 


97 


14 


51 


19 


73 


60 


49 


67 


65 


01 


06 

« i 1 - I 


' B 


80 


27 


78 


91 


06 


94 


00 


01 


38 


28 


54- 


08 


24 


00 


1 ^ J 

65 


B * 


1 15 


64 


79 


91 


81 
-i— .»^i k 


' 69 

t ■! 


67 


25 


38 


89 


4l 


56 


32 


52 


03 

• *j » ' 1 - 


’ C 


63 


62 


93 


39 


18 ' 


43' 


15 


§8 


10 


48 


26 


45 


84 


50 


39 


O' 


9° 


62 


87 


75 


36 


20 


35 


11 


05. 


70 


89 


27 


77 


50 


11 










1 1 


* - 






“ 


1 ii. i 






1 "■ 1 r 




i ‘ * . . 


" ' # >“*, rt J** * - 


D 


81 


71 


35 


' 25 


38 


73' 


'30 


92 


07 


49 


61 


75 


21 


64 


76 


D’ 


35 


19 


99 


l oi” 


38 


99' 


97. 

• « k 


45 


02 


32 


o4 


11 


58 


92 


'16 

*r^ * 




38 


72 


89 


11 


47 


99 


92 


64 


14 


68 


13 


36 


53 


38 


81 


' '"-fV 


38 


46 


31 


75 


K.. 


l4 


64 


8° 


06 


46 

i.*:t 1 


85, 

7 


86 


45 


■38 

- j\ 


98 

f t r * 


TlU t 

• F 


89 


69 J 


79 


38 


16 


51 


75 


05 


70 


74 


11 


80 


44 


32 


55 


F» 


26 


12 


18 


38 


78 


94 


88 


93 


37 


28 


11 


27 


22 


05 


04 


.. ‘ 


28 


12 


02 


77 


30 


31 


.19 


97 


99 


62 


27 


86 


56 


06 


53 


• G* 


06 


48 


*4-3 


21 


,03 


98 


71 


54 


26 


6? 


80 


-76 


08 


98 


80 . 


f 1 ! 

H 


90 


87 


04 


08 


67 


46 


59 


4l 


98' 


55 


10 


82 


"22 


29" 


87 


H’ 


44 


10 


55 


29. 


00 


59 


72 


82 


28 


55 


87 


30 


07 


08 


93 - 


J 


46 


72 


93 


62 ■ 


45 








_ ; , 


, * - 




vv,- 


", 


A J, . 


| » a 




59 


68 


24 


62 


53- 






• 


L 


- 


- 


f 


- r 


1 ’ * 1 J 


li-IJj' \ ' 



»• »»*> 1 f "P V 



..Sul i t, i » ’ : ' — - j^. lf « 

The dinome distributions for the two messages 



are 



0 12 



"nr. * «T‘ 

3 ^ 



5 6 7 8 9 



0 12 



. . .. 

as follows: 

3 4 5 6 



r :jy: 



i < 



. . ./ti 

8 -9 



0 


2 


2 


1 


1 


1 


1 


2 


1 . 


2 




• 0 


1 


2-- 


l 


2‘ 


2 


2 


3 


1 


3 


- 


1 


2 


2 


1 


1 


1 


2 


1 


- 


1 


1 


1 


l 


4 


_r 


- 


2 


1 


1 


- 


1 


2 


2 


- 


1 


1 


- 


1 


1 


2 


2 


2 


1 


2 


1 


1 


1 


- 


1 


1 


2 


2 . 


2' 


1 


3 


2 


2 


2 


■M ■- 


*» 


1 


1 




5 


2 


• 3 1 


2 


l 


2 


- 


» - 


2 


1 


1 


5 


- 


4 


- 


1 


1 


1 


1 


2 


2 


1 


.1 


_i 


4 


- 


l 


- , 


•1 


1 


3 


2 


1 


1 


1 


5 


1 


1 


1 


2 


1 


2 


2 


- 


- 


1 


5 


1 


1 


1 


1 


1 


2 


1 


- 


1 


2 


6 


- 


1 


3 


1 


2 


.1 


- 


'1 


i T 


1 


6 


1 


- 


3 


» 


2 


1 


- 


2 


1 


1 


7 


1 


1 


2 


1 


2 


2 


1 


1 


i s 


1 


7 


1 


l 


1 


1 


1. 


2 


1 


1 


1 


1 


8 


2 


2 


2 


1 


1 


- 


1 


2' 


1 


2 


8 


3 


l 


1 


- 


- 


1 


1 


2 


1 


2 


9 


1 


1 


2 


2 


1 


- 


1 


2 


2' 


2, 


9 


1 


l 


-i 


_2 


-1 


- 


- 


2 


3 


2 



■ * . % 



Distribution for 
Message "A" 



Distribution for 
Message "B" 



* '*«- k 

" -5" . 



- *4 



•+ A- 



- RESTRICTE D" 



1*1-3 




REF ID: A5 68 95 



REBTRICTED 



,‘T' 



c. Since a general absence of marked crests and troughs is noted' “in 
both distributions, if the division of these cryptograms into cLinomes ,^s 
coiTecf , and if they are both monoalphabetic , it is quite probable thaV‘ 
some type of vai’Iant system (or systems ) has been used. With this in 
mind, the encrypted texts and their distributions are scrutinized further 
for some indication of the kind of. relationship which exists between the 
methods of encipherment of the two messages. The distributions are seen 
to be strikingly similar, not only with respect to the location of the 
one predominant peak in each, but also in the close correlation of the. ^ 4 
locations of the blanks in each.^T Furthermore, upon examination of the 
superimposed messages themselves, it is observed that there are several 
instances wherein a value in message "A" coincides with the same value 
in message "El" (e.g., see positipns a/A' 3.4, b/b* 9)? This observation, 
taken in conjunction with the marked similarity of the distributions, 
strongly indicates that not only has the same general cryptosystem been 
used for the encryption of both messages, but .that the same enciphering 
matrix has been used for both. Also, in the case of the values 3& and 
6 2, it is noted that wherever either occurs in one message the same value 



| For the benefit of the s tudeht with a mathematical background, it 
might be interesting to point out certain applications of cryptomathe- 
matics in connection with these two distributions . E'irst of all, each of 
the two distributions is much flatter than that which would be expected 
for a sample of 125 dinomes of random text; i.e., a drawing (with replace- 
ment) and recording from an urn containing equal numbers of counters in 
each of 100 categories labeled 00-99 consecutively. In other words, 
whereas "random" follows a characteristic distributional appearance, ap- 
proximated by the normal or binomial distributions, the samples at hand 
exhibit phenomena even flatter (or "worse" ) than that expected for ran- 
dom, approaching the theoretical (and fantastically non-random) "equi- 
librium" of exactly the jame number of tallies in each cell of a distri- 
bution. The following tabie gives the observed number of x-fold repe- 
titions in the two distributions, together with the expected number of 
x-fold repetitions in a sample of like size of random text, which expected 
number has been computed from tables of .the Poisson exponential distri- 
bution (see Military Cryptanalysis, Part III); 



- 


Observed 


Observed 


- 


X ■ 


Msg. "A" 


Msg. "B" 


Expected 


0 




17 


29 


1“ 


51 * 


52 


36 


2 


33 


23 


22 


3 


1 


6 


9 


4 


- 


1 


3 


5 


1 


1 


1 



It is to be noted that in the distribution for Message "A" the observed 
number of blanks (l*t) against the expected number of blanks from random 
text (29) represents a sigmoge or standard deviation of 2.78 <r , which 



RESTRICTED 



Ihh 



■ .( 



r t! 



,J*EF ID : A56895 



occurs ^ t pfi othp£ n^ggoge, a phenomenon explainable on . the assumption . 
that ijhe giaiulexb equivalents^ of these.'values are 'of such. low, frequency 
that ho variant* values fiave Wen r provided for "these pla'intc'xb'' letters in 
the cryptosystem. 

d. With the foregoing details determined, it is now realised that 
it should he possible to form, between the two messages, "chains" of 
those cipher values which represent identical plaintext letters, a.s . > 
exemplified below. Beginning with the first value’ in each message, 82 ■ 
and 30, a partial chain of ’ equivalent variants is started; ! now’ locating 
some other occurrence of either value elsewhere (e.g., 82 at position H'8), 
and noting the cipher value, coinciding with it (in this case, hi), the 
partial chain maybe extended (including now 82, 30, and hi). After this 
particular chain is extended to include as many values as possible, 
another chain is formed by starting with any value which has hot already 
been included in the preceding chain, this procedure being repeated until 



can be translated as odds of 368 to 1 against its occurrence by pure 
chance. Likewise the other entries besides 0 (in particular, the x-values 
of 1 and 2 , and the cumulative, .values of 3 -and-better) may be evaluated 
in terms of sigraageS', ' and the conclusion would be reached that the tiro 
distributions have a most remote chance of being as flat as they are 
r J}hrotv;h mere chance; foy instance * it is 3*05 <r or 877 to 1 against dis- 
' "Wibuhion* "A", having only two 'tallies occurring three or more times when 
13 such tallies" are .expec be<| Ipy random- -and this s igniage when taken into 
consideration* with that 'of the number of blanks yields a sigmage of h cr 
or approximately 31,000 to 1 of occurring through sheer chance, The sUrn. 
total of all the deviations could be collectively evaluated, but this 
would involve the laborioufc "computation of a multinomial distribution. 
Since the distributions of the two messages are much worse than would 
even be expected for random chance, the conclusion is drawn that the 
dinoroe grouping is highly significant and therefore must be correct, and 
furthermore that the cryptosystem involves, variants in sufficient numbers 
for the plaintext letters to permit the_ encipherer to select the cipher 
equivalents with a view to. suppressing as much of the phenomena of repe- 
tition as possible. Secondly, the x test of the. 'two distributions gives 
a % value of 206, as against the % value of 156 fpr random samples of 
this size; this represents a sigmage of . 4 .02 cr , or a ratio of 33,000 to 
1 against its happening "by, pure ^chance ^ i .e . , if the cryptograms were not 
in the same general system ( and’ specific keys .“ Therefore it is a foregone 
conclusion statistically , that not. only do the cryptosystems involve di- 
nomes as the ciphertext grouping^ "but that the identical cryptosystem is 
^ iiivolyed ^n the^.twq^ messages;, and that because of the close correlation 
of th,e patters oj^he^ two ri distributions' , there is a good probability 
that the cryptograms contain identical plain "text* and therefore are iso- 
logs. This- specific illustration of the potentialities of cryptomathe- 
matics indicates “the important role that this branch of science may play 
in the art of cryptanalysis. 



1 T p * 1 * - « 



REF ID: A5 68 95 



RESTRICTE D- I 



all possible chains are completed. It is found that the following chains, 
arbitrarily arranged here according to length, may he derivecl from the 
two messages: 

(06 l 4 15 2 6 28 31 35 73 7 1 '- 8i 89 98 99) ' 

(02 07 20 22 43 44 6? 90) ■■ - ... 

(12 37 48 51 69 70 83 94) - <- 

(03 30 4 l 54 65 82 97 ) 

(05 10 2l| 32 49 87 93 ) • 

(16 18 36 76 78 79 86) . 

( 27 '45 53 64 80 92) - 

(11 39 75 88 ) - - — 



(21 58 77 84 ) 
( 4 b 59 68 72) 
(00 52 67) . 
(04 55 6ij . 
(08 29 56) 

(19 71 96 ) 

(01 25) . 

(13 85) . 

(42 60) 



Single dinomes:' 

( 38 ) ( 47 ) ( 50 ) 



(62)_ (?l) 



If we now make an arbitrary assignment of a different letter to represent 
eaph chain (and each single dinome) and convert either of the messages to 
uniliterai terms by means of these arbitrarily-assigned values, we note 
the pattern of the opening stereotype "KEFEIffiNCE YOUR MESSAGE.....”, and 
quickly recover the plain text. 

e. The plaintext values when inserted into a 10 x 10 matrix having 
arbitrarily-arranged coordinates yield the following: 



- 


0 


1 


2 


3 


4 


5 


6 


7 


8 


9 


0 


u 


M 


T 


R 


p 


0 


E 


T 


F 


- 


1 


0 


D 


N 


H 


E 


E 


A 


- 


A 


c 


. 2 


T 


I 


T 


- 


0 


M 


E 


S 


E 


F 


3 


R 


E 


0 


- 


- 


E 


A 


N 


B 


D 


4 




R 


Y 


T 


T 


S 


L 


V 1 


N 


0 




X 


N 


U 


S 


R 


P 


F 




I 


L 


6 


Y 


r 


W 


T 


S 


R 


- 


-u 


L 




7 


IT 


c 


L 


E 


E 


D 


A 


I 


A 


A 


8 


3 


E 


R 


N 


I 


II 


A 


0 


D 


E 


- ■ 9. 


T 


G 


S 


0 


N 


- 


C 


R 


E 


E 



Manipulating the rows and columns with, a view to.uncQvpring some^ symmetry 
or systematic phenomena, the latent diaconal^ pattern" of "the ^equivalents" 



_ f ir 



' ■ * ‘ 9 J1 







REF ID: A5 68 95 



RESTRICTED 



T* _ », -t-\ 



w» i in^,» 



' ; p * 



for , car tain of .the letters (such as Ep, Np, Op, Rp, and Sp) is revealed, 
and the ,rowg and columns of the reconstruction diagram are permuted to 
•yield the following original enciphering, matrix:. . x 






r - ^ r * * * 

Z i *1 1 r . 

•PV'jjfC r ■ : T v 

j.;- ’ jf' 



-* 1 ": ,f r » 



i y i 1 *1.1 



- - j 



.6 


8' 


« | # r l 

9 i[ 


<-■ 

5 


h 


£ TC* 

3 7 


.5 

2 


I 


A 


A 


A 


C 


D 


E 


E 


I 


L 


If 


A 


A 


C 


D ■ 


E 


E 


H 


K 


N 


0 


A 


B 


D 


E 


E 


n 


J 


"H 


0 


R 


A 


D 


E 


E 


H 


I 


If 


0 


R 


S 


C 


E 


E 


G 


I 


' N 


0 


R’ 


' S’ 


T 


E 


E 


F 


I 


M 


0 


Q 


'S 


T 


T 


E 


F 


’ I 


M 


0 


P 


R 


T 


T 


U 


F 


I 


L - 


N 


P 


R 


's’ 


T 


‘ U 


X 


I 


L 


N 


P' 


R 


S 


T 


U 


tf ’ 


’Y 


L 


N ’ 


0’ 


s 


S 


T’ 


T* 


V 


Y 


Z 



7, 

T 
’3 
’8 

‘9 
2 

"i v ,v i Jrrrj 7 ~ 'y** 

j lAi 1 . Mn: • f.J.- g 
■ - -*«** *-« ■ sr.7 j/Jf • 

,*r -,w: • • j*- ? 

"There are' hb oh^serjrahle. relationships JL’n or between the sequences of 
digits in ^he'Vo^l^^d^olxMn, cobrdiria^s’/^therefore for want of "any 
visible phenomena 6lF further informatio n on the ’derivation (if any) “of 
'■ 'the We digits, it i^asSunbcL that they mUsb ha^e been assigned at ' fandom. 
The student will note* 1 that’ the' final matrix is identical - to that of 
Figure 39 in paragraph 59 • •.*» /’**•- / • 

f . It should be emphasized that in the example of the preceding 

subparagraphs it was only passible bo form chains of values from both 
messages reciprocally beqause the same enciphering matrix had been used 
for both.. A non-reciprocal .chaining procedure would have been' required 
if only the general system had been the same for both but the enciphering 
matrices had differed in some respect, or 'if two completely different 
variant systems had been used 'Te.g., one using a frequential matrix and 
the other involving a. less -complex type of variant matrix, - such as Fig. 
29). Specifically, it would have been lieqessary to maintain two sepa- 
rate groups of.' chains , . one ’ grqup Tor each message j otherwise heterogeneous 
values would have become intermingled.’ ■ 

g. Although .fin analysis of but one isolated example by means of 
isologs was presented, the '-student should be able to appreciate the 
significance and potentially enormous value - of lsologs to a cryptanalyst. 
This value goes far beyond the simple variant encryption in a monoalpha- 
betic substitution system: isologs produced by the use of two different 
code books, or two different enciphered code versions of the same under- 
lying plain text, or two encryptions of identical plain text by two dif- 
ferent "settings" of a cipher machine, may all prove of inestimable Value 

^-n the attack on a difficult cryptosystem. 

/ ’ ' ' . j . 

* » -* - * 



i4t 



RESTRICTED 




REOTRICTEfr 



REF ID: A5 68 95 




- ■» V 

63 « Further remarks on variant systems . — a. A few words should 

added with regard to certain subterfuges which are sometimes encountered 
in monoalphabdtic substitution with variants,' and which, if not reco'gSJi 
rfized in time, cause considerable delays. The considerations treated 
"before in subpars . 52i and on the disguise of the length of the "basic 
multiliteral group apply equally here to multiliteral substitution with 
variants ; thus , in dinome systems , a sum-checking digit or a null might i 
"be added in specified positions of the group to form a trinome. In 
complex variant systems, the presence of a null as one of the digits Ojf 
a trinome would add greatly to the complexities of cryptanalysis of that 
system. "The most important of the subterfuges have to deal with the use 
of nulls which are of a different size than the real cryptographic units, 
inserted occasional] y to prevent the cryptanalyst from breaking up the 
text into its proper units . The student should take careful pote of the 
last phrase; the mere insertion of symbols having the same characteristics 
as the symbols of the cryptographic text, except that they have no mean- 
ing, is not what is meant. J^his class of nulls rarely achieves the pur- 
pose intended. What is really meant can best be epcplained by an example. 
Suppose that a 5*5 variant matrix with the row and column indicators 
shown in Fig. 46 is adopted for encipherment. Normally, the cipher units 
would consist of 2-letter combinations of the indicators, invariably 
giving the row indicator first (by agreement). 



V G I W D 
A H P S M 
T 0 IS B N 
F U R L C 

J T 



v,a,t;f 


A 


B 


C 


D 


E 


G,H,0,U 


F 


G 


H 


I-J 


K 


I,P,E,R 


L 


M 


N 


0 


P 


W,S,B,L 


Q 


R 


S 


T 


U 


D,M,N,C 


V 


W 


X 


Y 


Z 










. L r «>l 



Figure *l6 



The phrase COMMANDER OF SPECIAL TROOPS might be enciphered thus : 

COMMANDEROP . . . 

VI EB PH IU FT IE AB TH WO "FW GT ... 



These would normally then be arranged in 5 -letter groups , thus: 
V I 13 13 P II I U F T 1 E A B T H U 0 P W G T . . . 



140 



.RESTRICTED 




* *> 



'REF ..ID : A56895 



b, XI v 111 Ijc noted, however, that only 20 of the 2 <j_ letter;.; of the 
alphabet have boon employed as row and column indicators, leaving J, K, 
q, X, X, and !*. unused. flow, suppose these six let Lera arc used nr, nulls, 
not in paivn , bu t ns Individual let lore inserted at random Just before 
the real text is arranged in 5-lettcr groups . Occasionally, a pair of 
letters might "be inserted, in order to mcislc the characteristics of 
" avoidance” of those letters for each other. Thus, for example : 

V I E X B PIIKIU FJXTI EAJBT MWOQP tt G K T Y 

The cryptanalyst, after some study suspecting a biliteral cipher, pro- 
ceeds to break up the text into pairs : 



VI EX BP Hi IU FJ XT IE AJ BT I'M OQ FW GK TY 



Compare this set of 2-letter combinations with the correct set. Only 4 
of the 15 pairs are "proper" units. It Is easy to see that without a 
knowledge of the existence ~of the nulls— and even with a knowledge, if 
he does not knew which letters are nulls — the cryptanalyst would be con- 
fronted with a problem for the solution of which a fairly large amount of 
text might be necessary. The carcrul employment of the variants also 
very materially adds to the security of the method because repetitions 
can be rather effectively suppressed. 

c. Similarly in the examples under paragraph 58, the letter J in 
Figs. 27 and 29 may be used as a null; the letter Y in Fig. 28; and the 
digit 0 in Figs. 33 and 34. . In Fig. 30, any letters in the range of 
P - Z might be used as nulls, but this usage might be weak because of the 
extremely low frequency of these letters as compared with the letters 
A - 0; this is an important point to consider in the examination of en- 
crypted text for possible poor usages of nulls . " 



d. From the cryptographic standpoint, usage .of nulls in the manner 
outlined above results in cryptographic text, even more than twice as long 
as the plaintext, thus constituting a serious disadvantage . From the 
cryptanalytic standpoint, the no' -ing of the cipher units in the system 
described in subpar. b abo^e. constitutes the most Important obstacle to 
solution; this, coupled with the us ■>, of variants, makes this system con- 



siderably more difficult to salve , 



.espite its mono,alphabeticity. 







NATIONAL SECURITY AGENCY 



j 



r 



1 



COURSE 

IN 

MILITARY CRYPTANALYSIS, PART I 



NOTICE: This document contains information affecting the national defense 

of the United States within the meaning of the Espionage Laws, Title 18, 
U.S.C., Sections 793, 794 and Title 50, U.S.C., Sections 46, 46a and 46b. 
Its transmission or the revelation of its contents in, any manner to an 
unauthorized person is prohibited "by law. 



National Security Agency 
Washington 25, D. C. 



1 




December 1952 



RE S TRICTED 



REF ID: A5 68 95 



♦ 



(BLAMK) 






RESTRICTED 



REF ID: A5 68 95 



RESTRICTED 

■ COURSE . E'T MILITARY CRYPT AtTALYS IS , PART I 
Monoalphabetic Substitution Systems 



Introduction 

This is the first of a series of six basic courses in the art of 
military cryptanalysis. The purpose of this course is to impart to the 
student the methods and techniques which form the basis for the crypta- 
nalysis of the simple types of military cipher systems. An understanding 
of these principles is necessary to grasp the more advanced cryptonalytic 
techniques employed in the attack on the complex cryptosystems which 
constitute present-day military cryptography. 

The scope of this course is: fundamental principles; unillteral 

substitution; multilitoral substitution; polygraphic substitution; and 
miscellaneous monoalphabctic substitution systems. It consists of ten 
lessons and an examination as follows: 

Lesson 1, Fundamental principles 

Lesson 2, Uniliteral substitution with standard and mixed cipher 
alphabets 

Lesson 3 , Multiliteral substitution: miscellaneous matrices; 

Baconian and Trithemius systems; elementary Baudot systems 

Lesson 4, Multiliteral substitution with variants 

Lesson 5, Polygraphic substitution; small matrices 

Lesson 6 , Polygraphic substitution: quadricular tables 

Lesson 7 > Polygraphic substitution: miscellaneous systems 

Lesson 8, Miscellaneous monoalphabetic substitution systems; 
concealment systems 

Lesson 9 , Monoalphabetic substitution with irregular-length cipher 
units: monome-dinome systems; miscellaneous systems 

Lesson 10, Syllabary squares and code charts 

Examination 

The text reference for this course is the National Security Agency 
publication, "Military Cryptanalysis, Part I" (December 1952). 

This course has been designed as a self-study or extension-type 
course; therefore, there is no limit placed on the number of hours that 
may be spent in the completion of the course, any lesson, or the examina- 
tion. However, for statistical purposes it is requested that the student 
indicate the number of hours spent in the completion of each lesson and 
the examination. 



RESTRICTED 



3 



REF ID: A5 68 95 



- >*■ V 




The cryptograms in this estcrse have for the most part been arranged 
in proper worksheet form, obviating the necessity of recopying; and 
frequency distributions have been given to reduce the amount of time spent 
on the purely “clerical labor incidental to the solution. The underlying 
texts of the cryptograms comprise hypothetical ground, naval, air, and , 
general administrative messages , Where necessary for solution, the 
specific nature of the text of any particular cryptogram Is ‘ indicated. 
Otherwise, the text of a message may be assumed to be general ** 

administrative or ground text. 

■ . 

The only materials required are cross-section paper of -j^-inch squares, 
and a set of printed and blank alphabet strips. An eraser is of the ut- 
most importance. 

Special Instructions 

So far as is practicable, detailed work sheets which usually form 
a part of the solution should be submitted with the solutions . In all 
the lessons of this course, it is required that the student recover all 
cipher alphabets, cipher tables, and specific keys used. He will also 
be required to state the method of operation of each cryptosystem and 
give the key words upon which each component is based. 



✓ 



RESTRICTED 



4 




\ 



l 



1 






REF ID: A5 68 95 



- RESTRICTE D 



Oecurlty Information 



NATIONAL SECURITY AGENCY 
Washington 25, D. C. 



COURSE 
LESSON 2 



TEXT ASSIGNMENT 



1. a. What is the first step one should take in attempting to solve 
an unlcnown cryptogram that is obviously a substitution cipher? 

b. If this step is unsuccessful and the cryptogram is obviously 
monoalphabetic in character, what type of cipher alphabet may be assumed 
to have been used? 

2* a* Name two methods of solving monoalphabetic substitution 
ciphers involving standard cipher alphabets* 

b. In the solution of a substitution cipher by completing the 
plain component sequence involving reversed standard alphabets, what are 
the successive steps? 

c . Why do monoalphabetic cryptograms involving standard cipher 
alphabets""yield such a low degree of cryptosecurity? 

3* What are four characteristics of vowels which permit their 
classification as such in monoalphabetic substitution ciphers involving 
mixed cipher alphabets? 

4. a. What two places in every message lend themselves more readily 

to successful attack by the assumption of words than do any other places? 
Explain* * 

b. What is meant by the "probable word method" of solution? 

5. a. What is meant by the word pattern "A B C B A D B"? 

b. For each pattern given below, indicate one good English word 
that contains the pattern: 

(1) A B C B A D B 

<2> A A B A 

(3) A B C D A 



Military Cryptanalysis, Part I 

Uniliteral substitution with 
standard and mixed cipher 
alphabets 

Sections V and VI 



RESTRICTED 



1 



RESTRICTE D 



REF ID: A5 68 95 



6. Solve the following cryptogram and indicate the specific 
key (Apn6 c ): 



J M Q V S 


Q Z X I F 


F M Z S L 


I Z M L Z 


C E M E B 


F Q 0 M E 


M D X Y Q 


0 Z C Y Y 


X J M Z I 


V M Z I Y 


0 Q W Y I 


D K Y M V 


M Z M N Q 


E Q K M X 


C C W Z B 


0 Y I X I 


C D Y Y X 


C B Z Q I 


F Z C Q N 


H W D 0 X 


ICDJQ 


Y P M H D 


Y M V M Z 


M F S N Q 


E Q K H N 


Q D N E W 


0 J M A W 


IBEHD 


X N M Y X 


ZCSUN 


Y X C B U 


HQZME 


C V'IDK 


C W Z X Z 


C C B Y X 


C Z M Q Z 


B C Y I X 


I C D Y Y 


X C B Z Q 


F Y X 0 D 



% |r _ 

^ _ S' ^ 

= - W 

ABCDEFGHIJK I’M NO PQRSTUV V XYZ 
<j>p=2655 <j) r =l?31 4*0*2636 



7. Solve the following cryptogram, and indicate the specific key: 



W X L M K 


H R X K L 


A T 0 X U 


X X G H K 


W X K X W 


HEIKH 


V X X W T 


M H G V X 


M H T K X 


T P A X K 


XIHUP 


T K B G X 


T V M B 0 


B M R A T 


L U X X G 


K X I H K 


M X W L M 


H I T V D 


GHPEX 


W Z X X X 


1 

% 

■ ^ ■ as -2 

= “ ^ 2= g’ _ ■== = 2 ^ g 

ABCDEFGHIJKLMNOPQRSTUVWXYZ 




<t>p«66o 


4>r«38l 


<J)q«848 





RESTRICTE D 



2 



REF ID: A5 68 95 

RESTRICTED 

8, Solve the following cryptograms, and indicate the specific keys: 
a. QHHYL YDWQJ JMEFC 

h. YXSED YFSXU HWXUS 

9« The following hadly garbled cryptogram was intercepted. Recon- 
struct the original plaintext message, resolving the errors and omissions, 
and indicate the specific key: 



H 


U 


V 


S 


E 




D 


S 


U 


- 


E 


K 


H 


C 


U 


I 


E 


Q 


W 


U 


D 


K 


- 


R 


U 


H 


0 


X 


H 


U 


U 


U 


Y 


M 


X 


J 


I 


U 


- 


U 


D 


T 


Q 


J 


u 


T 


E 


D 


U 


A 


Y 


N 


T 


U 


S 


mm 


mm 


M 


wm 


M 


I 


J 


E 


F 


Y 


D 


I 


J 


K 


H 


S 


J 


Y 


E 


M 


I 


0 


Q 


L 


u 


R 


u 


U 


H 


Y 


I 


I 


K 


U 


- 


J 


E 


Q 


B 


D 


I 


K 


R 


E 


E 


T 


Y 


D 


Q 


J 


- 


s 


E 


C 


C 


Q 


- 


T 


I 


J 


E 


Y 


D 


Y 


W 


Y 


Q 


J 


U 


K 


D 


Y 


J 


J 


H 


Q 


Y 


D 


C 


D 


w 


F 


H 


E 


¥ 


H 


Q 


K 


I 


K 


D 


T 


U 


E 


J 


X 


A 


F 


H 


E 


R 


Y 


I 


Y 


E 


D 


I 


E 


V 


F 


Q 


H 


Q 


M 


H 


Q 


U 


X 


J 




E 


E 


V 


— 


F 


«■ 


S 


Y 


Q 


B 


T 


H 


T 


U 


H 


I 


D 


M 


C 


R 


U 


H 


I 


Y 


T 



= ^ 

^== e % ^ 

l£i= Sfjllgs mf __=5l£ is 

ABCDEFGHIJKLMHOPQRSTUVWXYZ 

<J>ps2270 <j) r ai311 <t>0«2136 



RESTRICTED 




3 



- RE S TRICTED 



! 



REF ID : A56895 



10. a* Construct a triliteral frequency distribution shoving one 
prefix and one suffix of the letters of the cryptogram below* On the 
work sheet below, Indicate by underscoring in black all repetitions of 
three or more letters • Other significant details may be marked in 
different colors; 



b. Prepare a condensed table of repetitions of digraphs and 
trigraphs""appearing more than twice, and include all repetitions of longer 
polygraphs • 

c* Using the data obtained in a and b above, complete the 
solution of the cryptogram, and recover all keys « 



5 



A 

B 

C 

D 

E 

F 

0 

H 



U B S Y B 
U X X P Z 
P B Z H I 
V G H 0 P 
N P U X P 
Q P P X P 
B M G V V 
C Z A H B 



10 

V X R P R 

XBNBH 

Z U X G L 

P A B A Z 

B Z V X P 

DQZQF 

GPHVH 

U V B 0 B 



15 20 25 



C G U M Z 
I G V R P 
L B U I B 
U B Z P N 
C D U B B 
G R U B R 
B D Z X G 
Z X P B U 



X G P H P 
R V X U Y 
MQLZR 
B C G H B 
REGLL 
P R R Z G 
H B E B R 
R P R A G 



C U B Q P 
R X G H D 
B MB R X 
M G L B V 
B V X P Q 
V V Z R R 
Z Y V B P 
XGPHV 



if- 



RESTRICTED 



REF ID: A5 68 95 



11* Solve the cryptogram below, suspected to contain the probable 
word "BLOCKADE" j recover all keys* 



5 . 


10 


15 


20 


25 


LCTOE 


LUZOD 


UGREA 


VZUSR 


F Z X D Y 


DRTLD 


S D R Z S 


D E U C M 


UZZEZ 


U D C D V 


T Q T X D 


A 0 Y Z C 


Z W Y D X 


JP T V Z D 


■S CMZZ > 


R Z A Q L 


LDE C M 


JURXB 


TLCMT 


L W Z Z R 


ZS3ZX 


0 Z V L C 


_D 0 U D X 


JZCET 


UUTHZ 


S U D A D_ 


E U F Z L 


L Z Y L X 


D R 0 N R 


E Z LCD 


HTUT1 


L M D L C 


eyzlm 


D tJ Z 0 D 


LHCED 


BLTR7 


MTLVT 


A I E Z V 


U T E Y Y 


S R Z L X 



g ggg— — 

ABCDEFGHIJKLMNOPQRSTUVWXYZ 

4>p B 2655 <1**1532 4 > o *27T0 



5 



REF ID : A56895 



12. Solve the following cryptogram, and recover all keys* 




EL W H E D Z VHJPJ ZHJLP JXBKV JLTWM 



F W H WED WHW DM WSWDW J R E X I TKZCE 



G KDJPW DCEMW DOKZH JJEPJ JPSB 



HLKVFEH W J W E D H NZHJ E X X P W VJEND 



HJEFS EDXWV OPJWE DVZQK ZHJZT 



_gg 

ABCDEFGHIJKLMROPQRSTUVWXYZ 
<^pa3362 <*=19^0 4 q S 356o 



6 



RESTRICTED 



REF ID: A5 68 95 



13 • Using the sequences recovered in Problem 12, solve the following 
cryptograms and indicate the specific keys: 

a. URJJR XQUQX KSARB BET 0 1 

ABCDEFGHIJKLMNOPqIsTUVUX. YZ 

4>p S 25 4**15 4> 0 *l6 

b. F D L D Y XZUMU E U F P H DVOFE ALYRW 

UHL JX AFDYE X E K Q P DOYCV R E U A X 

ABC DEf GH I JKLMHof U S TUVUXYZ 

4>psl63 ^r®9^ 

l4. The following cryptograms, enciphered with random cipher 
alphabets, are in bona fide word lengths. Solve them. 

a. HY ARV JZGHAROT VK CGKMMGKHZM LKUG 
LKUG 0 R 0 6 SOZ SMVHFSRMJROT 

i 

JEHZPUHGVEGM RO MCJKKSJKUME 

b. RGRQRU TDBPYURDP ZFTAVDRC AYCFO 

JO DRZYUUFSPPFUZR TFADYGP 

c. CDGWDSA LCAUMMDOR BUCD YV DVD JR 

IYSUAUYVS' 1/ Z C *Y S S OUTDO 



RESTRICTE D 



7 



REF ID: A56895 

RESTRIGTEB - 

15* In solving several unrelated monoalphabetic cryptograms t the. 
following cipher alphabets were reconstructed. Recover all key words in 
each case. To facilitate solution, significant segments have been 
underlined. 

Q> • 

P: ABCDEFGHIJKLMNOPQRSTUVWXYZ 
0: If L W PFRTHSYDQ A K V EBMXGCOZ I J U 



b. 

“ * 

P: ABCDEFGHIJKLMNOPQRSTUVWXYZ 
C: Z Q X P E ONM W LKJHGF DBVYUTRICSA 

c. 

Pt ABCDEFGHI, JKLMNOPQRSTUVWXYZ 
CiPQERVMOZWUTHAX BCD F S Y G I J K L N 

d. 

P: ABCDEFGHIJKLMNOPQRSTUVWXYZ 
CiAUZJTXHSWGRMBN PCI Q F E K Y P D V L 

e. 

P: ABCDEFGHIJKLMNOPQRSTUVWXYZ 
CiCKY E B 0 Y F D P Z G Q H S ITLWNJURAMX 

f. 

P: ABCDEFGHIJKLMNOPQRSTUVWXYZ 
C: LM CPOQI_JHR_SNTBD_EUGVKA W X Y F Z 

£• 

P: ABCDEFGHIJKLMNOPQRSTUVWXYZ 
C: C D G P V Z K H Q L A E I J N S W U B F M 0 T X Y R 



h. 

P: ABCDEFGHIJKLMNOPQRSTUVWXYZ 
C: LBEKDGRMFA X S N H C Z T 0 I Y U P J V Q W 



RESTRICTED 



8 



I 



RESTRICTED" aecvurlly Information 



NATIONAL SECURITY AGENCY 
Washington 25, D. C. 



COURSE 
LESSON 1 
TEXT ASSIGNMENT 



1. a. What four things were thought "by, Captain Hitt to he essen- 
tial to crypt analytic success? 

b. What six additional elements are also highly desirable? 

2. a. Define the terms "cryptology", ''cryptography", and " crypt - 
analysis. 17 

b. What are the essential differences between substitution and 
transpos it ion? 

£. Differentiate between a code and a cipher system. 

d. Explain the difference between the terms "general system" 
and "specific key" . 

e. Distinguish between monoalphabetic and polyalphabetic 
substitution . 

3. What four fundamental operations are involved in the solution 
of practically every cryptogram? 

4. In the solution of cryptograms involving a form of substitution, 
to what simple terms is it necessary to reduce them in order to reach a 
solution? 

5. Is it always necessary to determine the specific key in order 
to reconstruct the plain text? Explain. 

6. Indicate the language In which you would expect the plain text of 
the encrypted portion of the following message to be written. Give reasons 
for your answer. 

From: Joao Fialho, Sao Paulo, Brasil. 

To: Gualterio Costa, New York City. 

Com referenda ao seu telegrama. NSM NRJPN INJ PMVCOCEN 

VNPSN PMBMPGEN QMT JBCVCJ IJTJM DTGAJ LTMCPN KPJUCEMIVCNP PMHMQQN 

UMIVCHMISJQ SMFVMCPJ SPCHMQSPM. 



Military Cryptanalysis, Part I 

i 

Fundamental principles 
Sections I -IV, inclusive. 



1 



REDTRICTED 



REF ID : A56895 



7. a. The letter E represents what percentage (in round numbers) 
of the letters in English telegraphic text? 

b, What are the four most frequent consonants in English tele- 
graphic text? 

c. What are the five letters of lowest frequency in English 
telegraphic text? 

d. What are the four most frequent digraphs in English tele- 
graphic text? 

e, Account for the discrepancies between frequencies of letters 
in English literary text and English telegraphic text. 

8. What three facts can be determined from a study of the uniliteral 
frequency distribution? 

9. In the following extract from a speech given during World War II, 
each dash indicates the omission of a letter. Complete the text by 
writing the necessary letters over each dash to form appropriate words. 

"Washington’s Birthday is e most a p occasion 

for us to talk with each about things - al they are 



and things as we they shall be in the 



"For t years. General Washington and his ________ 

^ ^ Army were" faced £ o _ with formidable""^ 

and recurring — — — — — — — ~ — _ and equipment were 

lacking. In a every winter”* was — a — Valley Forge. Through- 
out the states there existed selfish men, jealous • 



men, u 1 men, who that Washington's 

_ _ _ _ _" was hopeless, that he should - ask - f or an 

peace. - — — — — — — — — 

’ "Washington's in those hard has provided 

the for all Americans^ ever since — a model "of — moral __- 

_ ___ — a. - He - held to his , as it had been charted in - the 

Declaration of Independence. — He and the men who __ _ ^ 

with him knew that no man's life or — was secure, "without" 

freedom and free i — n - s . 

"The present _____ struggle has us increasingly 

that o m of - person and •£" of property anywhere 

in the — depend upon the s'ecurity - of the rights and obliga- 

tions of liberty and _______ everywhere in the world. 

"This war is a new °f war . It is 

from all other wars of the — — , not only in Its methods and 



-RESTRICTED" 



.2 



REF ID: A5689 



Tjub also in its geography* It is warfare in terms of 



every c o n _ ^ . every a d, every sea, and every 

a ^ ~ n e in™" the"* world. The ~ 3 Z Z Z oceanfl which have "been 

S 11ZZZZ- the past as our ~ ~ Z Z _ from attack 

Fave~become s s battlefields on“wSich"we are 



— Z challenged by our enemies — — — 

10* a* In the following examples the words Of sentences have heen 
transpose's* Rearrange the words to make plain text* 

(1) AT NOTHING REPORT THIS TIME TO 

(2) ARTILLERY SECTOR BARRAGE NORTHWEST HEAVY IN 

b* In the following examples the letters of several words of 
each sentence have heen transposed. Rearrange the letters to make good 
words that will give intelligible plain text, 

(1) Eight SESTYODRER have DTPADERE to join SAKT REOFC 

(2) ABELSKJ to contact ATTAUSBLO on my right AFKLN 

c. In the following examples the words of each sentence have 
heen transposed and, in the case of several words, the letters have also 
heen transposed. Reconstruct the plain text* 

(1) OLANG RIDGE TANK G3MN0V EHOTISL EAST NOMLCU 

(2) DOWN MEYEN OFANERTON SIX THIS OTHS SNEALP 

d. In the following examples, the letters of each word' of each 
sentence have heen rearranged in the order in which they appear in the 
normal alphabet* Reconstruct the plain text* 

(1) ADELY AACKCT CDDEEHLSU OT CCEEMMNO AT EGHXT HIST GIMNNOR 

(2) AUEEIIIMMTY NOHJ CEEIPRT ADHIRTWW 0T AADEEGNPRRR IINOOPST 

e. In the following examples the plain texb has heen broken up 
into groups of five letters and then in each group of five the letters 
have heen rearranged in the order in which they appear in the normal al- 
phabet. Reconstruct the plain texb. 

(1) ORSUU ABB® AEHNS ENSUV ADKOR ADEGM EEINN EMNVY EELSS S 

(2) AEIRR ACNNO ABfSS ADEPT ELORR OPRST AILRT EELRY ACLMP EEMNT 
DESST DEORY 




a 



RESTItlCTEB - 



REF ID: A5 68 95 



11. Using cross-section paper prepare a uniliteral frequency tar 
distribution of the letters of the following paragraph: 

"The shortest and surest way to live with honor in the 
world is to be in reality what we would appear to be? 
all human virtues increase and strengthen themselves by 
the practice and experience of them." 



12. Determine the class to which the cipher systems, which were used 
in enciphering the following messages, belong: 

i * 

a. 0 R A N A THPHO SKTCD MERES CERAE 

R R U S A ETLGD AYECA 

S’ 35 _ S=3= __ 

abcdefghijklmnopqrstuvwxyz 

b. DHJJK QOAHR XKSOF H P Q G A PPHLA 

DIADE EJROA MAHQA 

—j. ass-. _ 

ABCDEFGHIJKLMIOPQRSTUVWXYZ 

c. ROLEH KBWFZ CQCPZ NVJWZ M I V E Q 

EPCIN OJSJU Y M W Q B 



ABCDEFGHIJKLMNOPQ 
13. Which of the following substitution 



U J K L W 
S E L Y R 
M R Z A Y 
K R W A P 



E U V K L 
X Y X B X 
A 0 S G U 
K 0 I E V 



F S P A 
J D A T 
D C L G 
A R 0 E 



RSTUVWXYZ 
ciphers are monoalphabetic? 
Q PHTKR DZRGL 



U 

I 

V 



W E U Z G 
0 E W J E 
W S C W R 



W F V X M 
I F 0 K M 
S B C Y X 



ABCDEFGHIJKLMROPQ 



RSTUVWXYZ 



b. 



1 U P Y P 
S X X A Y 
W U P J P 
P J 0 P Z 



X X A E P 
P W K A S 
0 B S H U 
S V P Y S 



A F G Z 
LHPR 
H U P G 
M P 0 A 



P V G L H A 
H A L 0 B A 
F X G K P H 
X U L S L P 



S L X H U 
X P L V S 
P V S W U 
C G N J X 



zx _ — ~ jlT H r: 2^ — — =r JiT 

ABCDEFGHIJKLMROPQ 



RSTUVWXYZ 



k 



RESTRIGTEB - 



RESTRICTED 



'REF ID : A56895 



GXIVL 
G M X L W 
V H M X A 
RTIYZ 



Z X M X S 
Q I V Z W 
loth 
K T 0 X G 



L 0 Z G R 
Q B R X K 
TKM.X 
A W X L Q 



W E J L X 
K T D V L 
G B Q K Q 
LOZGR 



PWTKZ 
M X A E X 
L W Z X G 
X V W G Q 



5 S0 « 

S- —* % %% S ^ ^ ^ ^ 

ABCDEFGHIJKLMNOPQRSTUVWXYZ 

l4> The following messages were enciphered nusnoalphabeticaUy* Be* 
tennine in each case whether the cipher alphabet used was a standard or 
mixed alphabet and if standard, whether direct or reversed* 



a* 


ARTOR 


L 0 V N Q 


RLEZV 




ZHREZ 




W Z B 


0 R 




Z K Y L F 


A 0 Z S 0 


OIORF 




P J Z P P 




L D Z 


D N 




L R Z L B 


L A B W Z 


&HAPO 




W Q H 0 0 




R Z I 


Z U 






• 


-*• - 








5 




ES 


S — — - 


E — —— % 






5 




0 




A B C D E F G 


HIJKLMNOPQR 


s 


T TJ V W X 


Y 


Z 




b. 


E S P A P 


L V D L Y 


0 E C Z F 




RSDTY 


- 


E S T 


D 0 




T D E C T 


M F E T Z 


IBFII 




V W J T 0 




P Y E 


T Q 




J T E L D 


OTCPR 


E D E L Y 




0 L Q 0 H 




T A S 


P G 












0 








IS 






B?*' 


B 




% 


e 




ABCDEFGHIJKLMHOPQR 


S 


T U V W X Y Z 




c. 


PYHTt 


X 0 L W Y 


J J V Y X 




0 I L Y R 




YQYPJ 




KRYLK 


Y H Y L C ' 


P A Y A C 




LYXIR 




Q Y J V 0 




Z K 0 X C 


P C R E K 


U K U P J 




I U J U 0 




P R I A S 






mmm 








i 






5 


s _ 








= — _ = 


£ 







ABCDEFGHIJKLMHOPQRSTUVWXYZ 



RESTRICTED 



5 



REF ID: A5 68 95 

RE STRICTED 

r 

15. Derive the <j>p, A-g, A**, and Ao for each of the following 

distributions, and evaluate the /oonoalphabetic7 goodness of <j> 0 and A 0 
of each in terms of "good”, "fair", or "poor", entering these data in the 
attached diagram* On the basis of the foregoing, decide which distribu- 
tions are most probably monoalphabetic and which are most probably non- 
monoalphabetic, indicating your decision by a check (y) in the diagram; 
in the case of those not clearly belonging in either of these categories , 
check "decision suspended"* 

3 § —3 

a. ABCDEFGHIJKLMNOPQRSTUVWXYZ 



b. 1 B C D E F 0 1 1 J K L fi 5 0 P Q R I 5 U V W X Y Z 

£ 

c. A B C D E F 0 1 I J K L M N 0 P Q R f T U V W X Y Z 

“ ggm •— mm 25 g- 

d. ABCDEFGHIJKLMNOPQRSTUVWXYZ 

e. ABCDEFGHIJKLMNOPQRSTUVWXYZ 



f. ABCDEFGHIJKLMNOPQRSTUVWXYZ 



3_=s _ W 3 sa - 

g. ABCDEFGHIJKLMNOPQRSTUVWXYZ 



h. ABCDEFGHIJKL MNOPQRSTUVWXYZ 

Goodness Goodness Decision 
of <|> 0 of A 0 

H I +p I I $0 I Ap I Ar I M o|f|p g| fTp ®no.|gggo.|s«8p 



a# 























REF ID : A56895 



RESTRICTED j - - 

1 6 . From the intercepted traffic of three intercept stations oper- 
ating in the same sector of the front, the following code messages were 
selected for study by a member of the cryptanalytic section at GHQ* They 
are undoubtedly three versions of one enemy message, but there appears 
to be a number of differences, due no doubt to operating difficulties at 
the several stations . Study the messages and reconstruct from them the 
actual code text sent by the enemy station* 



I. Time intercepted 1612 byHB W F F V LDC 

GR 35 ST 





NR 


17 


D 


Y 


B 


I 


E 


D 


U 


F 


T 


0 


A 


M E 


J 


A 


•K 


I B 0 


N 


s 


G 


C 


0 Y 


F 


0 


B 


A 


K 


D 


0 


D 


L 


A 


L 


U F 


Y 


D 


K 


AW A 


L 


A 


P 


A 


Y N 


C 


0 


D 


A 


P 


K 


E 


D 


TJ 


R 


J 


0 P 


I 


D 


J 


E N 0 


X 


M 


E 


H 


A Z 


L 


0 


G 


I 


S 


K 


U 


T 


E 


G 


E 


V A 


V 


K 


I 


P B E 


M 


K 


E 


H 


Z A 


H 


0 


B 


W 


E 


A 


V 


D 


U 


Z 


F 


0 F 


A 




E 


M C 0 


Z 


E 


G 


B 


L 0 


D 


0 


F 


Y 


0 


E 


N 


C 


- 


- 


M 


AW 


E 


N 


- 


— 


- 


II. 


Time intercepted l6l0 by 


Mi 

MR 




M F F 


V 


L D C 


1 

t 


GR 


35 BT 






































NR 


I_ 


D 


Y 


B 


I 


E 


B 


U 


F 


T 


0 


A 


M E 


J 


A 


K 


I B 0 


N 


I 


P 


K 


0 _ 


F 




B 


A 


K 


D 


0 


D 


L 


A 


L 


TJ F 


Y 


L 


K 


AW A 


L 


A 


P 


A 


Y N 
















D 


U 


A 




_ P 


I 


D 


J 


E N 0 


X 


N 


E 


H 


A Z 


L 


0 


G 


I 


S 


K 


u 


T 


E 


G 


E 


V A 


V 


C 


I 


R B W 




K 


E 


H 


Z A 


S 


0 


B 


W 


E 


V 


A 


D 


U 


Z 


F 


0 F 


E 


T 


E 


M C 0 


Z 


E 


G 


B 


L 0 


D 


0 


F 


Y 


0 


A 


E 


C 


D 


A 


M 


A W 


E 


N 




° 


M 


E 


M 


C 


0 Z 


A 


C 


F 


A 


H 


L 


0 


F 


I 


R 


0 


9 3 


5 










III 


• 


Time : 


intercepted 


1612 


by YG 




W F F 


V 


L D K 


GR 




BT 






































NR 


17 


D 


Y 


B 


I 


E 


D 


u 


F 


T 


0 


A 


M E 


J 


A 


K 


S B 0 


K 


I 


P 


C 


0 Y 


Mi 






A 




D 


0 








L 


V F 


Y 


L 


K 


A W A 


L 


A 


P 


E 


T Y N 




C 


0 


D 


A P 


K 


E 


D 


U R 




W 0 


P 


I 


D 


JEN 


0 X 


M 


E 


H 


A Z 


L 


0 


G 


H 


K U T 


E 


G 




E V 


A 


U K 




I 


P B 


E M 




K 


E 


H 


Z A 


H 


0 


B 


W 


E 


A 


V 


D 


U 


Z 


F 


0 F 


E 


T 


E 


M C 0 


Z 


E 


G 


B 


L 0 


D 


0 


F 


Y 


0 


E 


N 


C 


0 


A 


M 


AW 


E 


N 


M 


AWE 


N 


E 


X 


F 


0 M 


E 


M 


C 


0 


Z 


A 


C 


F 


A 


B 


L 


0 F 


I 


R 


0 


9 3 5 






7 



REF ID: A5 68 95 




REF- ID : A56895 



RESTRICTED 



Securit y lufuiwatlon r 



NATIONAL SECURITY AGENCY 
Washington 25, D. C. 

COURSE Military Cryptanalysis, Part I 

LESSON 3 Multiliteral substitution with 

single-equivalent cipher alpha- 
bets 

TEXT ASSIGNMENT Section VII 



1. Solve the following cryptogram, And recover all keys: 



5 10 15 



A 


DT 


LR 


WE 


OE 


0E_ 


WH 


RR 


WR 


LA 


WH 


WA 


DE 


DA 


WR 


LE 


B 


t IE 


OR 


RE 


WT 


OR 


WA 


OH 


WH 


OR 


LE 


LR 


WA 


RR 


RR 


WH 


C 


WA 


WH 


OE 


OR 


LE 


LE 


WR 


WA 


WH 


OH 


LR 


LE 


LR 


WA 


OH 


D 


OE 


LR 


OA 


OA 


OE 


LR 


OR 


RE 


OA 


OA 


WH 


WT 


WH 


WA 


WA 


E 


^WR 


WA 


WH 


DE 


RT 


OE 


WH 


WH 


RE 


OR 


OA 


RT 


OE 


LR 


OR 


F 


RE 


WR 


WE 


WA 


OH 


DE 


WR 


LR 


WA 


WA 


WR 


WA 


WH 


DE 


DA 


G 


in 


LR 


WA 


WH 


OA 


DE 


LR 


IT 


IT 


LR 


OA 


WR 


DE 


WR 


LR 


H 


WA 


OA 


LR 


RA 


RA 


LR 


WE 


OE 


DE 


RT 


OE 


WH 


RR 


WR 


LA 


J 


. WH 


WA 


HE 


DA 


WR 


LE 


LE 


OT 


WH 


OE 


WH 


WH 


WA 


RA 


LR 


K 


OE 


OH 


WH 


RE 


or 


DO? 


OR 


RE 


RE 


WR 


DE 


WR 


LR 


WA 


OR 


L 


LE 


OR 


OE 


DE 


WR 


LE 


LE 


WH 


OE 


DT 


OA 


WE 


IT 


IT 


LR 


M 


OE 


DE 


OA 


DE 


LR 


LT 


OH 


LR 


LE 


LR 


WA 


WH 


LE 


OT 


WH 


N 


WA 


WA 


WR 


WA 


RR 























(For distribution, see next page) 



JL 



RESTRICTED 



REF ID : A56895 



A E H R T 

D 3 12 - - 3 

L 2 13 - 21 5 

0 10 14 6 10 3 

R 3 7 - 5 3 

W 22 4 22 13 2 



:2270 (|> r =1362 <|> 0 =2288 
(25-element alphabet) 



2. This message was sent by the Fifteenth Infantry. Solve It and 
recover all keys: 



CY 


AO 


NX 


CN 


NO 


CN 


AO 


AO 


OG 


ON 


NO 


BY 


OX 


OX 


RO 


CG 


NY 


RO 


AN 


RE 


AG 


RO 


OX 


AO 


AN 


AX 


AX 


AG 


AN 


AG ' 


CN 


RO 


OX 


OX 


BY 


AN 


AG 


CN 


BE 


CX 


BN 


BX 


CG 


RO 


ON 


CO 


RE 


CN 


AY 


BG 


CE 


ON 


NO 


AO 


OG 


RO 


NO 


NO 


RO 


RE 


00 


HG 


BY 


OX 


OX 


RY 


AG 


AX 


BY 


AN 


OG 


CN 


AO 


OY 


OG 


NO 


OX 


CY 


NX 


OG 


AO 


AN 


CN 


AG 


RE 


AG 


BY 


OG 


NO 


AO 


BO 


AO 


CN 


CG 


AG 


CN 


ON 


BO 


CN 


AO 


OY 


CO 


OE 


ON 


NO , 




OG 


RO 


NO 


NO 


RO 


NO 


AG 


CN 


RE 


AO 


OX 


RX 


AE 


BY 


AN 


BO 





























E G N 0 X Y 

A 1 9 7 12 3 1 
Bill 316 
C 1 3 11 2 12 
N - 3 - 9 2 1 
0 17 5 19 2 

R 5 - - 9 11 



4>p=960 (approx.) fcsluo <j> 0 =7l6 
(36-element alphabet) 



2 





REF ID : A56895 



RESTRICTED 

3. Solve the following cryptogram, and recover all keys: 

5 10 15 



A 


RG 


GP 


EE 


GR 


RG 


GP 


ES 


GR 


RG 


PP 


GE 


PR 


GE 


RG 


GS 


B 


AS 


GR 


RR 


GS 


AE 


PP 


GP 


GA 


PP 


RA 


EA 


ES 


GR 


RG 


PP 


C 




RA 


PR 


GS 


RE 


GP 


AR 


GP 


GS 


PP 


GP 


RG 


RA 


EA 


PP 


s 


PS 


PG 


AR 


PE 


GA 


RR 


RG 


GP 


RR 


RE 


PG 


PP 


RA 


EA 


RS 


E 


PG 


PE 


EG 


AR 


PE 


GA 


RR 


RG 


GP 


RR 


RP 


AE 


GS 


GA 


AP 


F 


GP 


PP 


RA 


EP 


ES 


GP 


RA 


GP 


RA 


PE 


PR 


PR 


AE 


GR 


GP 


G 


RA 


GA 


GP 


GP 


RR 


GP 


RR 


GR 


AS 


AS 


GP 


RR 


GR 


GS 


PP 


H 


GP 


AE 


GE 


RS 


PG 


RG 


GS 


RE 


PP 


GR 


GG 


GS 


PP 


GR 


PG 


J 


OA 


PG 


RS 


RE 


PG 


AS 


PR 


GS 


GA 


GE 


RR 


EA 


ES 


GR 


RG 


K 


HR 


RP 


GS_ 


_PP_ 


_PP . 


_GS 


AE 


GR 


PG 


GA 


EP 


RG 


GP 


EE 


GR 


I> 


RA 


GR 


PP 


GR 


PG 


GA 


AR 


GS 


RA 


RP 


GP 


GP 


GA 


GS 


PE 


M 


ES 


PG 


RG 


GR 


ER 


GP 


RR 


RP 


GE 


RG 


GP 


AG 


GR 


AS 


GP 


U 


GA 


PP 


GS 


AE 


AR 


PA 


EP 


RG 


GP 


PR 


AE 


GE 


RG 


GP 


TO 


P 


GP 


RA 


PP 


GP 


RR 

























A 


E 


G 


P 


R 


S 


A 


— 


7 


1 


1 


5 


5 


E 


4 


3 


— 


3 


1 


5 


G 


11 


7 


1 


27 


16 


14 


P 


1 


5 


10 


16 


6 


1 


R 


11 


4 


16 


4 


12 


3 



4 >ps 2260 (approx.) ^>=1164 ^ 0 =2294 

(30-element alphabet) 



RESTRICTED 






REF ID: A5 68 95 



RESTRICTED 



4. Solve the following cryptogram,, and recover all keys: 

5 10 




3s A B 



B 



B 




$ps499 4 r =277 $ 0 = 5te 

(27-element alphabet) 

5, Solve the following naval message, and recover all keys: 



10 1 


1 


0 3 


3 3 


1 2 2 3 1 


0 3 0 2 3 


3 3 


1 2 


2 


3 10 0 0 


0 0 2 


6 


0 6 


1 0 


1 5 2 3 1 
• 


4 0 4 2 4 


2 4 


0 5 


2 


33206 


0 4 2 


6 


1 1 


2 2 


3 3 2 6 3 


1 2 3 3 4 


1 1 


0 5 


2 


33011 


0 0 1 


1 


2 2 


0 0 


2 0 0 1 0 


0 2 6 0 0 


0 6 


3 5 


1 


6 2 6 1 1 


367 


6 


9 3 


1 0 


6 2 2 2 2 


2 6 0 5 0 


4 1 


2 2 


1 


0 4 1 0 1 


• 

9 11 


2 


4 2 


3 0 


5 2 6 0 4 


2 2 2 2 1 


2 1 


6 0 


4 


10 15 3 


0 2 3 


1 


4 l 


2 2 


3 0 10 5 


0 0 113 


5 0 


0 2 


4 


lllll 


5 0 4 


1 


0 1 


3 1 


4 2 3 0 5 


0 3 0 4 2 


6 0 


6 2 


3 


10360 



RESTRICTE D 



4 




REF ID : A56895 



& 



I 



restricted 



b, Solve the following cryptogram, and recover all keys: 



4 5 2 6 4 


56282 


02523 


29276 


1 6 1 4 5 


23820 


6 3 2 16 


52729 


27212 


6 0 6 5 2 


16729 


47694 


56529 


0 2 14 6 


0 4 1 6 1 


2 5 4 2 4 


90692 


12 14 3 


6 5 0 2 6 


45672 


92325 


61272 


8 4 5 ^3 


0 4 1 8 2 


0 4 2 2 1 


6 7 2 6 2 


9 4 5 2 3 


4 12 5 2 


9 2 9 4 5 


23820 


46272 


34506 


52921 


63023 


4 5 6 4 6 


7 4 5 6 5 


29082 


21670 


2 3 4 5 6 


1 2 5 8 2 


0 2 9 4 7 


27650 


29210 


23^72 


1 2 5 4 3 


65000 







7 * Solve the following cryptogram, arid recover all keys: 



05105 


23804 


91161 


3 8 ' 


3 4 9 


22702 


7 4 4 9 1 


16138 


33834 


9 2 2 7 4 


2 7 


5 0 5 


31612 


7 4 4 9 2 


16127 


1 4 9 1 4 


9 2 2 7 4 


3 8 


216 


12724 


91161 


2 7 13 8 


10523 


8 4 2 7 4 


05405 


23801 


6 1 4 9 l 


16105 


22713 


80271 


05227 


44910 


51052 


0 5 3 2 7 


1 4 9 2 1 


6 0 4 9 1 


0 5 2 2 7 


10502 


7 4 16 3 


38016 


11653 


8 5 4 9 2 


2 7 4 0 5 


2 0 5 3 1 


61494 


49238 


4 2 7 1 3 


8 2 4 9 2 


2 7 4 2 7 


20522 


7 13 8 0 


49127 


0 2 7 1 4 


91270 


4 9 14 9 


12702 


7 2 2 7 3 


0 5 5 0 5 


30522 


7 4 2 7 2 


16127 


13814 


93052 


49449 


24910 


52380 


0 5 


1 4 9 


23834 


9 14 9 2 


2 7 4 4 9 


23823 


8 2 3 8 4 


3 8 10 5 


2 3 8 4 4 


9 10 5 0 




5 



RESTRICTED 



REF ID: A5 68 95 



8. The following is a text in the Baudot teleprinter code enciphered 
hy a simple machine employing five two-position switches which operate 
polarized relays. Each switch has the function of changing the polarity 
of its respective baud (a single "mark" or "space" impulse), if the switch 
Is in the ’active* position. If the switch is In the ’inactive* position, 
the polarity of the baud is unaffected. The switch settings remain con- 
• staat for each message. As an example, if switches 1 and 4 are active 
(x), and 2, 3 and 5 are inactive (o), then the word ENEMY is enciphered 
thus: 

Key: xooxo xooxo xooxo xooxo xooxo 

Plain: +«+«+ j 

Cipher: — +- +-+— — +- +-+-+ --+++ j 

i 

Solve the message and recover the switch settings. 





1 


2 


3 




4 


5 




6 


■ 7 


8 




9 


10 


A 


+— +“ 


+-++- 




+ + -+ + 


+ ++ + - 


+"• 


MW 


-+++- 




” 






B 


+-+ 


*- 


+ »—• + 


- 


-+++ 


++ + 


++ 




+-+++ 


+++- 


>+ 


+++-■*- 


— +++ 


C 


++ + 


++++ + 


— + -f 


++-++ 


+ -+ 


+- 


4- 


-++-+ 


+++++ 




++--+ 


D 


+++ 


+++ 


+- ■ + 


++ !■++ 




+- 


— + 


— — •"++ 


++— 


■+ 


+++++ 




E 


+ + 


+-++- 


+ + + 


* 


+ 


+ + 


— 


+ - + 


-++ 




+-++“ 




F 


+—•*+ 


-•++ + — 




++ + 


I 

1 

+ 

+ 


+* 




+ 

+ 

+ 

1 


M*(aw n 


+ 


+-++« 




0 


+++ — 


+“■“+— 


- + “ + ~ 


+++*+ 


+++-+ 






+ 

1 

1 

1 

+ 


-++- 


'+ 


+-+ — 


-++ — 


H 




+-+— * 


“ - +“+ 


+++++ 


+ + 


+4 




I 

+ 

+ 

1 

+ 


+++- 


- 


+ + 


-+++- 


J 


-+ 


+ 

I 

+ 

1 

1 




+ 


+ 


+ + + 




— +4» 


— H+ 
















3: 




+ 


+ + 


t 


1 — 


- - 


- 














4: 




+ 


+ — 


1 


4* 


+ 


— 














5: 




+ 


- + 


mi 


♦ 


+ 


*• 














++ 




5 


l 4 


T 


3 


1 6 


1 




• 










+ - 




1 


5 - 


8 


4 


l 13 


1 














2 • — + 




- 


3 4 


3 


1 


3 1 


2 














— 




2 


- 5 


- 


2 


- 


3 









<i>p=480 (approx.) <f>r=234 <|> 0 =386 



(32-element alphabet) 



iM SBTKlCTED 



6 




REF ID: A5 68 95 



nEDTRICTECr 



NATIONAL SECURITY AGENCY 
Washington 25 , D. C. 



COURSE 
LESSON k 

TEXT ASSIGNMENT 



Military Cryptanalysis, Part I 

Multiliteral substitution with 
variants 

Section VIII 



1. Solve the following cryptogram, and recover all keys: 

5 10 15 




RA 


BE 


KE 


PE 


VE 


TI 


BO 


LA 


GO 


DU 


JO 


BE 


KI 


BI 


JO 


BU 


~JA 


VA 


ME 


LA 


BE 


KI 


RE 


FE~ 


DO 


VI 


JO 


SA 


DO 


JE * 


KI 


BA 


MO 


SA 


CU 


GE 


GE 


PI 


BO 


KI 


JU 


CE 


Cl 


MI 


NE 


FO 


JU 


CE 


RE 


NA 


BU 


BE 


~K0 


RA~ 


DE 


KE 


TE 


SE 


TI 


JO * 


' FA 


GO 


DU 


DO 


JE 


KE 


DI 


JO 


BU 


Ha 


CE 


BO 


FO 


BA 


BU *“ 


* DA 


EE~ 


JO 


NI 


DO 


NA 


BO 


BE 


"PI 


GI 


ME 


TE 


CO 


JO 


TI 


SA 


BO 


TI 


DU 


MO 


FA 


BU 


NT 


DU 


DE 


"TO 


GI 


BE 


SE 


BU 


GE 


CO 


PA 


TA 


KE 


CE 


NA 


VA 


MO 


LO 


ME 


NA 


DU 


DE 


CE* 


' BO 


FO 


DA 


DU 


"da 


LE 


BO 


SI 


JO 


VA 


DO 


DE 


~TI 


NI 


DO 


CO 


FI 


DE 


VE 


Cl 


BU 


DA 


Li” 


BO 


VI 


DO 


NA 


JO 


BE 


"o 


va" 


DU 


DE 


”ko 


GO 


RE 


MO 


PE 


SA 


RA 


JE 


KA 


DO 


PI 


RI 



(For distribution, see page 5) 



1 



fMTinTmoftED 



REF ID: A5 68 95 



2. Solve the following cryptogram, and recover all keys: 



5 10 15 



































A 


DR 


DD 


SY 


DA 


RA 


RR 


SB 


YA 


BT 


TY 


AR 


HI 


DB 


TB 


AD > 


B 


YY, 


YB 


SA 


AA 


HI 


DA 


TD 


HR 


YB 


TD 


BB 


RI 


AI 


HH 


BT 


C 


DD 


IA 


AI 


BB 


HA 


YD 


TH 


YA 


HI 


BA 


YT 


YD 


YY 


BD 


YH 


D 


SD , 


5T 


SB 


AA 


ST 


YD 


RH 


SD 


SR 


YR 


DT 


SR 


RA 


RR 


YB 


E 


SA 


BT 


TY 


HR 


AI 


DB 


IB 


AD 


DY 


YB 


SA 


HA 


HI 


DA 


TD 
























• 










F 


TS 


DB 


SH 


YH 


DI 


SD 


TT 


TT 


YY 


HH 


ST 


YI 


SB 


AA 


ST 


G 


X DD 


AH 


DH 


YT 


RH 


HI 


ID 


AR 


SB 


BA 


RI 


HB 


AI 


HI 


RH 


H 


DB 


SH 


HA 


RI 


DA 


AI 


IB 


YB 


DI 


SI 


DD" 


YA 


BB 


YT 


IS 


J 


II 


YH 


TY 


BS 


DD 


YR 


SR 


RI 


HH 


TD 


DT 


TA 


AI 


RY 


ST 


K 


SH 


DH 


AB 


AI 


TI 


YT 


AH 


HY 


AR 


AI 


RH 


DI 


YD 


DD 


YA > 


I 


' TB 


~W 


~hh 


SB~ 


AA 


DT 


DD 


RH 


YD 


“DR 


YB 


DH 


SH 


SR 


DD 


H 


DA 


SI 


RI 


ID 


ST 


BD 


SI 


SD 


TT 


BH 


SH 


RI 


AA 


HI 


BB 


M 


IS 


BI 


HI 


RH 


AY 


DB 


BA 


AI 


DH 


SH 













(For distribution, see page 5) 



•ft UUTlliCTED 



2 



REF ID: A5 68 95 



ftEOTIUCTE e- 

3. Solve the following cryptogram, and recover all keys: 

5 10 15 

A 
B 
C 
D| 

E 
F 
G 
H 

J| 

K 

L 
M 
K 
P 



1 — ... 


99 


18 


57 


82 


12 


28 


78 


90 


25 


oh 


15 


30 


04 


06 


14 


* 57 


34 


64 


20 


72 


15 


30 


02 


57 


44 


84 


52 


66 


11 


81 


87 


58 


35 


78 


31 


l4 


70 


90 


68 


47 


30 


13 


15 


21 


86 


92 


43 


10 


30 


35” 


20 


31 


"32 


64' 


18 


57 


26 


84 


12 


06 y 


‘ 34 


"25 


69 


72 


90 


"78 


07 


90 


31 


29 


57 


50 


82 


19 


53 


31 


72 


51 


36 


10 


86 


36. 


47 


18 


67 


26 


04 


92 


82 


30 


08 


31 


58 


90 


88 


87 


91 


10 


20 


82 


31 


~l4 


56 


57 


31 V 


*”88 


04 


31 


30 


66 


47 


30 


36 


18 


99 


~20 


06 


97 


31 


21 


55 


99~ 


18 


20 


10 


28 


74 


68 


90 


~4l 


69" 


82 


90 


78 


31 


86 


88" 


15 


91 


26 


92 


72 


87 


”l4 


43 


20 


53 


28 


64 


92 


47 


02 


58 


35 


10 


96 


05 


34 


37 


85 


oT 


26 


80 


50 


“92 


68” 


10 


70 


81 


-92 


18 


02 


86 


49 


47 


07 


82 


94 


06 


69 


15 


21 


90 


56 


10 


40 


01 


68 


190 


15 


35" 


57 


52 


"32 


60 


47 


64 


36 


71 


06 


55 


00 


68 


|78 


45 


52 


12 


69 


43 





(For distribution, 6ee page 5) 



KESTRICTED 



3 



REF ID: A5 68 95 

l 

RESTRICTE D . 

4, This message is suspected of having an ending similar to Prob- 
lem 3* Solve it and recover all keys: 



5 10 15 



1 












,_LJ 1 rnf 




r ‘ 


Jm 


~ r Fil F 




"""" 


n r "~ 






A 

1 


22 


“oT 


71 


29 


"l9 


"83 


05 


"34' 


76 


58 


¥ 


56 


62 


26" 


22 


B 


35 


48 


75 


13 


78 


58 


34 


65 


02 


07 


71 


51 


87 


35 


96 


C 


10 


32 


69 


45 


47 


81 


46 


11 


01 


l4 


67 


37" 


75 


79 


35 * 


D 


*15 


53 


29 


37 


46 


60 


19 


30 


94 


66 


49 


68 


88 


57 


98 


E 


• 84 


93 


30 


86 


28 


90 


51 


o4 


53~ 


03 


84 


76 


58 


TT 


» 

57 


P 


* 42 


12 


86 


49 


36 


79 


54 


"26 


09 


38 


24 


4l 


86" 


IT 


79 


G 


< 08 


28 


67 


68 


66 


94 


22 


63 


71 


66 


83 


IT 


05 


"of 


58 


H 


* 95 


60 


19 


62 


"26 


48 


23 


59 


4o 


38 


15 


67 


43 


92 


42 


J 


62 


77 


43 


79 


54 


69 


38 


65 


16 


82 


10 


96 


67" 


97 


> 

57 


K 


*“48 


93 


24 


13 


53~ 


29 


46 


37 


32 


65 


12 


94 


84 


95 


”68 


L 


83 


93 


98 


37~ 


75 


79 


ITS 


1 2. 


97 


84 


53” 


03 


75 


76 


95 * 


M 


* 31 


29 


32 


21 


"49 


17 


25 


73 


00 


69 


86 


36 


79 


45 


19 


H 


77 


98 


38 


95 


97 


93 


"94 


98 


72 


42 


59 


00 


08 


50 


44 


P 


27 


26 


62 


57 


06 


91 


23 












; 







RESTRICTED 



4 




REF ID : A56895 



RESTRICTED 



I 



5* Solve the following cryptogram. 


and 


recover all keys: 




80713 


06941 


35696 


CVi 

0 

CO 


1 3 


2 8 0 6 1 


3 7 6 9 5 


69680 


9 13 9 4 


78800 


255 


1 3 


28096 


9 113 4 


1* 7 7 1 3 


6 8 0 2 6 


97695 


139 


1 3 


7 2 5 0 2 


5 6 4 7 5 


8 0 2 8 0 


88091 


3 5 8 0 2 


252 


4 7 


3 13 4 1 


39696 


2 5 5 2 5 


12508 


09132 


478 


2 5 


8 1 3 1 4 


74256 


6 9 5 2 5 


5 13 0 1 


36477 


1 


3 1 


6 9 


4 6 9 6 6 


90699 


8 0 2 4 7 


46951 


30801 


8 


0 5 


2 5 


113 7 8 


0 4 4 7 0 


6 9 2 1 3 


113 0 8 


03477 












6. Solve the following cryptogram. 


and 


recover all keys: 




18905 


52131 


89011 


0 


4 4 


1 4 


52131 


3 4 0 2 2 


0 5 5 1 8 


9 2,0 2 2 


3 5 15 6 


1 


9 0 


0 5 


5 2 2 4 0 


5 5 14 5 


1 9 0 2 0 


2 15 6 1 


67189 


0 


8 8 


1 5 


60110 


4 4 19 0 


0 8 8 0 1 


119 0 0 


22055 


0 


5 5 


1 4 


5 4 0 4 4 


1 5 4 6 0 


3 5 8 3 2 


5 3 5 8 3 


1 4 3 0 3 


4 


l 5 


3 2 


5 3 4 7 4 


1 5 4 5 9 


4 6 0 3 5 


8 3 8 1 3 


1 4 2 8 0 


2 


7 9 4 6 


0 4 6 0 3 


1 4 4 4 8 


51628 


0 3 14 3 


5 8 4 0 4 


3 


3 6 3 7 


0 4 0 4 4 


1 5 2 9 1 


3 7 0 3 1 


43036 


7 3 7 3 0 


7 


2 9 7 1 


87296 


7 3 6 8 4 


7 0 7 5 7 


26957 


3 0 5 7 2 


7 


1872 


9 7 0 7 5 


7 2 5 5 0 


5 7 2 6 1 


7 6 8 4 7 


29729 


6 


0 6 6 l 


7 7 18 6 


5 15 7 2 


71871 


85385 


9 4 5 7 2 













4 





6 



REF ID: A5 68 95 



ttEOTmCTED 



7* Solve' the following cryptogram, and recover all keys: 



7 2 10 9 


19015 


4 17 7 6 


04657 


89925 


9 6 2 3 5 


7 0 3 6 8 


62717 


67091 


8 3 9 3 8 


9 9 2 9 4 


88596 


5 2 3 6 8 


62170 


3 7 0 9 1 


22620 


8 0 7 3 5 


9 6 6 9 5 


0 4 6-2 7 


17032 


- 5 3 l 3 6 


7 7 6 4 4 


2 2 5 3 7 


1 2 2 6 2 


47907 


38026 


* / 

- 2 2 7 0 3 


8 8 4 3 4 


30196 


0 4 118 


6 6 8 2 6 


2 7 0 3 4 


1 5 5 9 6 


8 4 8 2 5 


3 5 2 3 0 


46569 


1 6 3 7 5 


8 4 9 7 9 


7 4 8 9 3 


10920 


85780 


7 3 .5 4 1 


9 7 4 7 7 


67212 


08479 


3 5 2 1 0 


9 13 6 5 


78947 


3 9 8 6 5 


97030 


2 8 3 3 4 


1 5 4 3 2 


54516 


5 9 9 1 0 


0 4 6 3 9 


8 2 9 9 2 


2 6 5 4 1 


0 9 14 2 


4 3 4 3 0 


2 8 2 0 8 


7 5 8 5 2 


3 3 9 8 7 


0 3 7 1 2 


2 5 3 2 2 


67217 


5 8 5 7 8 



RESTRICTED 




7 



REF ID : A56895 

RESTRICTEB - 

8. The following cryptograms are > suspected to he isologs* Solve 
them, and recover all keys: 

Message "A" 



09728 


2 3 14 4 


3 3 9 8 7 


7 3 5 1 4 


2 7 7 6 9 


IO677 


9 4 4 l 8 


9 9 4 7 9 


4 19 4 8 


6 6 4 3 2 


2 4 3 7 4 


4 8 4 9 9 


5 6 7 5 8 


4 7 6 3 6 


3 5 5 4 6 


81176 


1 2 2 4 2 


3 0 7 7 7 


76194 


1 5 2 7 2 


6 2 6 4 4 


8 5 2 1 1 


2 13 6 1 


71687 


2 8 7 5 9 


72459 


47047 


2 0 2 0 4 


2 2 14 5 


5 3 5 7 0 


2 13 7 7 


5 8 4 6 7 


3 6 l 6 6 


1 3,0 3 7 

1 


0 5 3 5 8 


25876 


6 4 4 0 3 


3 3 5 2 4 


3 6 8 4 7 


9 8' 


9 7 5 


7 6 6 7 9 


8 3 6 3 7 


7 9 9 4 6 


0 5 7 7 7 


4 6 2 4 3 


9 5 


6 6 7 


15086 


4 7 9 2 0 


5 4 3 9 1 


2 7 2 8 4 


32060 


4 3i 


17 8 


9 4 3 6 7 


6 6 4 1 4 


32190 


1 5 4 2 9 


6 2 6 4 8 


6 o' 9 7 5 


4 7 9 1 5 


6 6 6 7 9 


1 4 4 2 2 


70281 


9 3 8 9 4 


7 13 6 8 


3 5 3 2 5 


27686 


2 17 0 7 


79439 


2 2 0 0 0 














Message 


"B" 








8 7 5 6 0 


7 7 4 4 4 


3 5 2 1 1 


4 110 9 

I 


3 3 7 7 2 


8 9 0 8 4 


5 5 4 1 5 


78586 


4 10 5 6 


1 

3 5; 5 0 6 


1 5 8 4 4 


48995 


2 0 110 


2 3 7 7 7 


5 8 19 9 


1 9',4 3 7 

\ 


5 7 0 5 2 


6 2 7 1 4- 


37174 


88756 


2 5 15 4 


1 1*7 2 4 


9 8 7 7 9 


72367 


61813 


38507 


47890 


6 8;7 1 9 


6 5 5 2 l 


08875 


68548 


81270 


3 3 6 0 9 


1 

l 7'5 5 4 


83811 


7 2 4 7 7 


85433 


50805 


3 7 5 9 8 


6 0 ,7 1 8 


3 7 3 0 6 


1 7 7 0 4 


06159 


6 2 7 1 4 


4 6 5 5 1 


6 9 


3 7 0 


5 0 9 4 5 


58696 


1 9 5 6 1 


70681 


8 6 6 0 0 


8 3 


^•7 4 


5 5 3 7 7 


7 15 0 2 


1 6 5 7 6 


4 12 9 5 


65052 


0 0 


7 5 1 

1 


47289 


3 3 9 5 6 


5 9 4 9 7 


38764 


6 6 5 7 4 


72261 

4 


0 8 5 6 0 


7 3 7 6 3 


6 8 3 5 0 


4 8 5 1 6 


25000 




• 







RESTRICTED 



8 



REF ID: A5 68 95 



RESTRICTED 

9. The- following naval messages are suspected to "be isologs, con- 
taining the probable word ‘'TASK FORCE” . Solve them, and recover all keys • 

Message “A” 



43022 


8 3 5 2 4 


2 6 0 6 0 


9 8 4 4 8 


5 6 17 5 


5 7 3 6 8 


05544 


5 4 7 1 3 


2 5 7 4 8 


1 8 9 9 5 


7 3 2 1 1 


78809 


78230 


4 6 7 4 6 


5 5 5 6 6 


'38971" 


5 2 8 3 5 


5 4 3 1 0 


66179 


30225 


49705 


63605 


7 5 3 1 0 


8 3 4 5 2 


92351 


0 3 13 2 


27998 


9 3 5 3 9 


26288 


110 9 5 


80473 


1 2 2 0 0 


6 3 3 6 9 


4 £ 1 0 8 


5 2 0 9 7 


114 7 7 


11306 


6 8 7 2 1 


98883 


6 8 4 5 3 


95650 


15 18 4 


59749 


92076 


67000 












Message 








77639 


3 2 3 3 8 


9 6 6 8 7 


3 2 5 8 3 


16771 


3 6 0 3 3 


25195 


2 10 0 7 


6 1 9 3 6 


3 7 14 7 


9 4 7 0 2 


74323 


91551 


8 4 0 3 Q 


2 3 2 1 1 


74696 


1 5 7 8 4 


3 4 7 4 6 


34170 


5 9 3 9 1 


3 5 5 8 4 


1 7 6 4 5 


6 5 7 5 2 


24915 


07432 


6 4 5 9 8 


9 9 10 4 


1 7 3 0 7 


6 6 6 3 9 


3 112 7 


9 0 4 0 2 


5 3 3 5 3 


77760 


8 4 4 7 9 


7 5 13 9 


10388 


0 2 2 8 5 


4 2 2 1 4 


8 0 13 2 


6 2 5 6 8 


1 

2 7 5 2 9 


4 2 8 7 5 


07934 


45455 


2 0 0 0 0 









RESTRICTED 



REF ID: A5 68 95 



RESTRICTED 

10. The following cryptogram is suspected to begin with the opening 
stereotype "REFERENCE YOUR MESSAGE....". Solve it, and recover all keys. 



4 0 1 6 2 


4 2 3 8 5 


5 2 10 4 


8 3 12 1 


4 4 4 2 2 


3 7 2 1 1 


99099 


4 2 12 7 


3 7 9 1 2 


7 7 7 8 5 


80116 


4 4 4 4 4 


• 1 3 3 7 8 


7 7 6 4 0 


1 2 2 5 5 


5 0 0 2 2 


4 8 8 8 3 


78850 


22287 


8 4 6 2 9 


9 9 9 2 0 


0 6 6 4 8 


9 12 5 3 


20729 


0 13 3 1 


81222 


9.0 0 5 1 


.9 9 5 2 3 


1 9 3 9 1 • 


41936 


6 10 4 5 


4 8 3 7 8 


8 8 3 1 1 


1 5 4 5 4 


00022 


05509 


6 0 6 1 5 


5 7 12 9 


1 8 8 5 9 


20396 


6 6 6 0 3 


14945 


3 5 0 7 9 


88552 


8 2 4 1 1 


0 8 6 6 3 


05032 


28600 


0 7 7 2 2 


5 5 2 1 2 


0 0 0 8 0 


0 0 7 7 4 


72883 


4 0 9 0 Q 



RESTRICTED 




§: 



APPENDIX 2 

TM FREQUENCY DATA - ENGLISH 



REF ID : A56895 

RESTRICTED 



ENGLISH CRYPT ANALYTIC DATA 

frequency tables 

Table No. Pago 

1-A. Absolute frequencies of letters appearing in five Sets of Governmental plain-text telegrams, each set 

containing 10,000 letters, arranged alphabetically 4 

1-B. Absolute frequencies of letters appearing in five sets of Governmental plain-text telegrams, each set 

containing 10,000 letters, arranged according to frequency 5 

1- C. Absolute frequencies of vowels, high-frequency consonants, medium-frequency consonants, and low- 

frequency consonants appearing in five sets of Governmental plain-text telegrams, each set con- 
taining 10,000 lGt)j6r8_.b..&_.akha.kBaUkaiii>.i.baBbaSfi>*St>S Kb.l.Bft.vB&a&ASt&aBaKSakBa.aaakM.* 6 

2- A. Absolute frequencies of letters appearing in the combined five sets of messages totalling 60,000 letters, i 

arranged alphabetically. = »=** 6 

2-B. Absolute frequencies of letters appearing in the combined five sets of messages totalling 60,000 letters, 

arranged according to frequency.. ***«**_.***._„*_. *. aa 6 

2-0* Absolute frequencies of vowels, high-frequency consonants, medium-frequency consonants, and low- 

frequency consonants appearing in the combined five sets of messaged totalling 60,000 letters.. *..* 6 

2-D. Absolute frequencies of letters as initial letters of 10,000 words found in Governmental plain-text tele- 
grams. (1) Arranged alphabetically and (2) arranged according to frequency...***.* * 6 

2-E. Absolute frequencies of letters as final letters of 10,000 words found in Governmental plain-text tele- 
grams. (1) Arranged alphabetically and (2) arranged according to frequency. ** 7 

8. Relative frequencies of letters appearing in 1,000 letters based upon Table 2-B. (1) Arranged alpha- 
betically, (2) arranged according to frequency, (3) vowels, (4) high-frequency consonants, (5) me- 
dium-frequency consonants, and (6) low-frequency consonants .*..*„*. .*.*.*.**** 7-8 

4. Frequency distribution for 10,000 letters of literary English, as compiled by Hitt. (1) Arranged 

alphabetically and (2) arranged according to frequency... ..*»* * -*._*... 8 

6. Frequency distribution for 10,000 letters of telegraphic English, as compiled by Sitt. (1) Arranged 

alphabetically and (2) arranged according to frequency * . * . * . * , 8 

G-A. Frequency distribution of digraphs, based on 50,000 letters of Governmental plain-text telegrams; 

reduced to 6,000 digraphs....*... **.„._***...„..** ** 9 

G-B. Frequency distribution of digraphs (naval text) based on 20,000 letters of naval text; reduced to 

2,000 digraphs.-**-.**-...*..* *.** 10 

7-11. Absolute frequencies of digraphs, trigraphs, and tetragraphs and the logarithms of their as- 
signed probabilities * 11-88 

7-A. The 428 different digraphs of Table 6-A, arranged according to their absolute frequencies, accom- 
panied by the logarithms of their assigned probabilities..**** 18-16 

7-B. The 18 digraphs composing 26% of the digraphs in Table 6-A, accompanied by the logarithms of 
their assigned probabilities, arranged alphabetically according to their initial letters (1) and ac- 
cording to their final letters (2) and according to their absolute frequencies * 16 

7-C. The 63 digraphs composing 60% of the 5,000 digraphs in Table 6-A, accompanied by the logarithms 
of their assigned probabilities, arranged alphabetically according to their initial letters (1) and ac- 

^ cording to their final letters (2) and according to their absolute frequencies. 16 

7-D. The 122 digraphs composing 76% of the 6,000 digraphs in Table 6-A, accompanied by the loga- 
rithms of their assigned probabilities, arranged alphabetically according to their initial letters (1) 

and according to their final letters (2) and according to their absolute frequencies 17-18 

7-E. AU the 428 digraphs of Table 6-A, arranged first alphabetically according to their initial letters 

and then alphabetically according to their final letters 18 

8. The 428 different digraphs of Table 6-A, arranged first alphabetically according to their initial 
letters and then according to their absolute frequencies under each initial letter, accompanied by 

the logarithms of their assigned probabilities 19-21 

9-A. The 428 different digraphs of Table 6-A, arranged first alphabetically according to their final 
letters and then according to their absolute frequencies, accompanied by the logarithms of their 

assigned probabilities 22-24 

9-B. The 18 digraphs composing 26% of the 6,000 digraphs of Table 6-A, accompanied by the loga- 
rithms of their assigned probabilities, arranged alphabetically according to their final letters (1) and 
according to their initial letters (2) and according to their absolute frequencies 26 



2-2 



REF ID: A5 68 95 



RESTRICTED 



Table No. Page 

9-C. The 53 digraphs composing 50% of the 5,000 digraphs of Table 6-A, accompanied by the loga- 
rithms of their assigned probabilities, arranged alphabetically according to their final letters (1) and 

according to their initial letters (2) and according to their absolute frequencies 26-26 

9-D. The 122 digraphs composing 76% of the 6,000 digraphs of Table 6-A, accompanied by the loga- 
rithms of their assigned probabilities, arranged alphabetically according to their final letters (1) 

and according to their initial letters (2) and according to their absolute frequencies 26-28 

9-E. All the 428 different digraphs of Table 6-A, arranged alphabetically first according to their final letters 

and then according to their initial letters - 28 

10-A. The 66 trigraphs appearing 100 or more times in the 60,000 letters of Governmental plain-text tele- 
grams, arranged according to their absolute frequencies, accompanied by the logarithms of their 

assigned probabilities — — - 28 

10-B* The 66 trigraphs appearing 100 or more times in the 50,000 letters of Governmental plain-text tele- 
grams, arranged first alphabetically according to their initial letters, and then according to their 

absolute frequencies, accompanied by the logarithms of their assigned probabilities 29 

10-C. The 66 trigraphs appearing 100 or more times in the 60,000 letters of Governmental plain-text tele- 
grams, arranged first alphabetically according to their central letters, and then according to their 
absolute frequencies, accompanied by the logarithms of their assigned probabilities 29-80 

10- D. The 56 trigraphs appearing 100 or more times in the 60,000 letters of Governmental plain-text tele- 

grams, arranged first alphabetically according to their final letters, and then according to their abso- 
lute frequencies, accompanied by the logarithms of their assigned probabilities... 30 

11- A. The 64 tetragraphs appearing 60 or more times in the 50,000 letters of Governmental plain-text 

telegrams, arranged according to their absolute frequencies, accompanied by the logarithms of 

their assigned probabilities— 31 

11-B. The 54 tetragraphs appearing 60 or more times in the 50,000 letters of Governmental plain-text 
telegrams, arranged first alphabetically according to their initial letters, and then according to their 

absolute frequencies, accompanied by the logarithms of their assigned probabilities 81 

11-C. The 54 tetragraphs appearing 60 or more times in the 50,000 letters of Governmental plain-text 
telegrams, arranged first alphabetically according to their second letters, and then according to 

their absolute frequencies, accompanied by the logarithms of their assigned probabilities. 82 

11-D. The 64 tetragraphs appearing 60 or more times in the 60,000 letters of Governmental plain-text 
telegrams, arranged first alphabetically according to their third letters, and then according to 

their absolute frequencies, accompanied by the logarithms of their assigned probabilities ... 32-38 

11-E. The 54 tetragraphs appearing 60 or more times in the 60,000 letters of Governmental plain-text 

telegrams, arranged first alphabetically according to their final letters, and then according to their 
absolute frequencies, accompanied by the logarithms of their assigned probabilities. ........ 83 

12. Average length of words and messages. 84 

13. Checkerboard individual frequencies - 86 

14. Relative logarithmic values of frequencies of English digraphs 86 

16* Relative logarithmic values (Logo 222) of frequencies of English digraphs 87 



***** 

SPECIAL-PURPOSE DATA 

l6-A. Frequency distribution of digraphs, based on 64,3^5 letters of 
decrypted U. S. Government messages in -which Z was used as a 

word-separator and X was used for both Xp and Z..*,.. 38 

l6-B. Frequency distribution of digraphs, based on the text used for 
Table l6-A, from which the Z word-separator has been omitted 

(total: 53,866 letters) ..... 39 

l6-C • The 53 digraphs from Table 6-A which comprise 50$ of the to- 
tal, arranged according to frequencies reduced to a base of 
5,000 digraphs, shown with the corresponding frequencies of 
the same digraphs from Table 16-B (also reduced to a base 
of 5,000) 40 

2-3 

RESTRICTED 



REF ID: A5 68 95 



Tabus 1-A.- 



each set containing 10,000 letters, arranged alphabetically 



Absolute 

Frequency 




1,867 

258 

166 

810 

742 

18 

86 

865 

242 

786 

685 

241 

40 

760 

658 



Absolute 

Frequency 



788 

103 

800 

413 

1,294 

287 

175 

351 

750 

17 

38 

393 

240 

794 

770 

272 

22 

746 

583 

879 

233 

178 

168 

50 

155 

17 



Absolute 

Frequency 



681 

98 

288 

423 

1,292 

308 

161 

335 

787 

10 

22 

383 

238 

815 

791 

817 

45 

762 

585 

894 

812 

142 

136 

44 

179 

2 



Absolute 

Frequency 



740 

83 

826 

451 

1,270 

287 

167 

349 

700 

21 

21 

386 

249 

800 

766 

245 

38 

735 

628 

958 

247 

183 

133 

53 

218 

11 



10,000 



10,000 



10,000 



10,000 



10,000 



























REF ID: A5 68 95 




Table 1-B . — Absolute frequencies of letters appearing in five sets of Governmental plain-text telegrams, 
each set containing 10,000 letters, arranged according to frequency 




Table 1-C . — Absolute frequencies of vowels, high-frequency consonants, medium-frequency con- 
sonants, and low-frequency consonants appearing in five sets of Governmental plain-text tele- 
grams, each set containing 10,000 letters 



Set No. 


Vowels 


High-Frequency 

Consonants 


Medium-Fre- 
quency Conso- 
nants 


Low-Frequency 

Consonants 




3,993 


3,527 


2,829 


151 




3,985 


3,414 


2,457 


144 




4,042 


3,479 


2,356 




'flBiiMiiMjM 


3,926 


8,672 


2,358 


144 




3,942 


8,646 


2,389 


123 


Total 1 


19,888 

i 


17,538 


11,889 


685 



1 Grand total, 50,000, 



2-6 

































REF ID: A5 68 95 



RESTRICTED 



Table 2-A. — Absolute frequencies of letters appearing in the combined five sets of messages totalling 
. 50,000 letters, arranged alphabetically 



A 


3,683 


G 


819 


L.... 


- 1,821 


Q- 


176 


V, 


766 


B 


..487 


. H — 


1,694 


M 


1,837 


R--r*r- 


3,788 . 


ty 


780 


C. 


1,634 


I— 


3,676 


N 


.. 3,976 


S. 


3,068 

4,596 


X 


231 


D 


2,122 


J..„. 


82 


0.... 


.. 3,764 


T. 


y 


967 


E. 

P...... 


6,498 

1,416 


K 


148 


P.... 


.. 1,336 


u...~ 


1,300 


z 


49 



Table 2-B . — Absolute frequencies of letters appearing in Ike combined five sets of messages totalling 

50,000 letters, arranged according to frequency 



E 


.... 6,498 


I— 


.... 3,676 


C 


.... 1,534 


Y 


967 


X 


.. 231 


T. 


.... 4,595 


S 


.... 3,058 


F...... 


.... 1,416 


G 


819 


Q 


.. 175 


N. 


.... 3,975 


D 


.... 2,122 


P 


.... 1,335 


W 


780 


K 


.. 148 


R....u 


.._ 3,788 


L 


.... 1,821 


U. 


.... 1,300 


V 


766 


J 


82 


0 ...... 


.... 3,764 


H. 


.... 1,694 


M 


.... 1,237 


B 


487 


Z 


.. , 49 



A 3,683 



Table 2-C . — Absolute frequencies of vowels, high-frequency consonants, medium-frequency con- 
sonants, and low-frequency consonants appearing in the combined five sets of messages totalling 



50,000 letters 

Vowels — 19,888 

High-frequency consonants (D, N, R, S, and T) 17,638 

Medium-frequency consonants (B, C, P, G, H, L, M, P, V, and W) 11,889 

Low-frequency consonants (J, K, Q, X, and Z) 686 



Total - 50,000 



Table 2-D . — Absolute frequencies of letters as initial letters of 10,000 words found in Governmental 

plain-text telegrams 



(1) ARRANGED ALPHABETICALLY 



A 


905 


G„ 


109 


L 


.. 196 


Q...... 


30 


V 


77 


B 


287 


H.. 


272 


M 


.. 384 


R...... 


.... 611 


W 


... 320 


C 


664 


I_ 


344 


N 


.. 441 


S. 


.... 965 


X 


4 


D 


525 


J.. 


44 


0 


.. 646 


T...... 


.... 1,253 


Y 


88 


E 


390 


K.. 


23 


P 


.. 433 


U. 


.... 122 


Z 


12 


F 


855 


































Total. 


...10,000 








(2) ARRANGED ACCORDING TO 


FREQUENCY 






T 


1,253 


R.. 


611 


M 


.. 384 


L...... 


.... 196 


J 


44 


S 


965 


D.. 


525 


I 


.. 344 


U 


.... 122 


Q 


30 


A 


905 


N.. 


441 


W. 


.. 320 


G....... 


.... 109 


K 


23 


F 


855 


P_. 


433 


B. 


.. 287 


Y 


88 


Z 


12 


C 


664 


E.. 


390 


H 


- 272 


V 


77 


X 


4 


0 


646 














' 




















Total. 


...10,000 





REF ID: A5 68 95 



RESTRICTED 



Tablh 2-E . — Absolute frequencies of letters as final letters of 10,000 toords found in Governmental 

plain-text telegrams 



(1) ARRANGED ALPHABETICALLY 



A 


.... 269 


G.. 


225 


T. 


354 


Q 


8 


V 


4 


B 


22 


H„ 


450 


M 


154 


R 


769 


W 


45 


C. 


86 


I_ 


'22 


N ’ 


872 


s... 


962~ 


X.'. 


... 116 


D 


.... 1,002 


J.. 


6 


0 


575 


T..' 


1,007 


Y 


... 866 


E 


.... 1,628 


K.. 


53 


P 


213 


U.. 


31 


Z....1... 


9 


F 


.... 252 












■ 






















Total.. 


...10,000 








(2) ARRANGED ACCORDING TO, 


FREQUENCY 






E 


.... 1,628 


R„ 


769 


F 


252 


c_ 


86 


I 


22 


T 


.... 1,007 


0 .. 


575 


G 


225 


K.. 


53 


Z 


9 


D 


.... 1,002 


H„ 


450 


P 


213 


W.. 


45 


Q~ — 


8 


S 


962 


L.. 


354 


M 


154 


u.. 


31 


J 


6 


N. 


.... 872 


A.. 


269 


X— 


116 


B.. 


22 


V 


4 


Y...... 


.... 866 










" _ 


‘ 







Total.... 10,000 



Table 3. — Relative frequencies of letters appearing in 1,000 letters based upon Table 2-B 

(1) ARRANGED ALPHABETICALLY 



A 


73.66 


G™ 


16.38 L 


36.42 


Q 


.3.50 V 


.. 15.32 


B 


. 9.74 


H„ 


33.88 M 


24.74 


R 


75.76 W. 


.. 15.60 


a 


30.68 


I 


73 . 52 N 


"“79.50 


s 


61.16 Y 


4.132 


D 


42.44 


j.... 


1.64 0 


-- 75.28 


T 


' 91.90 Y 


„ 19. &4 


E 


129.96 


K..., 


2.96 P 


..... 26.70 


U. 


‘26.00 Z 


.68 


F 


.28.32 












1 

1,000.^0 














Total.... 








(2) ARRANGED ACCORDING TO FREQUENCY 


■■ 1 




129.96 


L. 


73 . 52 C 


SO.fiR 


Y 


19.34 Y 


4.62 


T 


91.90 


s... 


’ 61.16 F 


28.32 


G 


16.38 Q 


.. 3.50 


N 


79.50 


D... 


42.44 P 


26.70 


W 


15.60 K 


_ 2.96 


R 


75.76 


L... 


36.42 IJ 


26.00 


V 


1 5 . 32 .T 


1.64 


0 


75.28 


H... 


33.88 M 


24.74 


B 


9.74 Z 


.98 


A 


73.66 


























Total 


1,000.00 






(3) VOWELS 


(4) HIGH-FREQUENCY 






A 




73.66 




CONSONANTS 






E 




• 129.96 


D. 




42.44 






I 




73.52 


N 


„ 


...... 79.50 






o 




75.28 


R 




75.76 






U 




26.00 


s _ 


, , 


— 61.16 






Y 




19.34' 


• T 


__ 


...... 91, 90 





Total 397.76 



Total 350.76 




REF ID: A5 68 95 



DESTHIGTEB - 



Tablb 8, Contd . — Relative frequencies of letters 

(B) MEDIUM-FREQUENCY 
CONSONANTS 

B 9.74 

C 30.68 

F. 28.82 

G 16.88 

H........ ....... — .... ’88 ■ 88 

f, 86.42 

M 24.74 

P 26.70 



appearing in JiOOO letters based upon Table 2~B 

•(6) LOW-FREQUjBNCY 
CONSONANTS 

X....... .......... ......... 4 . 62 

$ 8.50 

K 2.96 

J 1.64 

2 .98 

Total 18.70 



V 15.82 

ff 15.60 

Total (8), (4), 

Total 237.78 ( 5 ), (6) 1,000.00 



Table 4.— 


-Frequency distribution for 10,000 letters of literary English, as 


compiled by 


•Hitt » 








(1) ARRANGED ALPHABETICALLY 








A. 


778 


G. 


174 L 


372 Q 


8 


V 


112 


B 


141 


H. 


595 M 


288 R 


651 


w 


176 


C 


296 


I. 


667 N 


686 S 


622 


X 


27 


D 


402 


J. 


51 0 


807 . T 


856 


Y .. 


196 


E 


.. 1,277 


K. 


74 P 


223 U 


.308 


Z 


17 


P 


197 




















(2) ARRANGED ACCORDING TO FREQUENCY 






E 


.. 1,277 


R_ 


651 n 


308 Y 


196 


K 


74 


T 


.. ' 855 


s. 


622 C 


296 W 


176 


j 


51 


0 


.. 807 


H. 


595 M 


288 G 


174 


x 


27 


A 


778 


D. 


402 P 


223 B 


141 


z 


17 ' 


N 


_ 686 


L. 


372 F 


197 V 


112 


Q 


8 


I 


.. 667 














Table 6.— 


- Frequency distribution for 10,000 letters of telegraphic English, as compiled by Hitt 1 ■ 








(1) ARRANGED ALPHABETICALLY 








A 


... 813 


G. 


201 L 


392 Q 


38 


V 


136 


B 


... 149 


H. 


386 M 


273 R 


677 


w 


166 


C 


... 306 


I, 


711 N 


718 S 


656 


X 


51 


D 


._ 417 


J. 


42 0.... „ 


844 T 


634 


Y 


208 


E 


1,319 


K_ 


88 P_ 


243 U 


321 


Z 


6 


F 


._ ' 205 




















(2) ARRANGED ACCORDING TO FREQUENCY 






E 


... 1,319 


s. 


. _.. 656 U 


821 F 


205 


K . 


88 


0 


... 844 


T. 


634 C 


806 G 


201 


X_ _ 


51 


A 


... 813 


D. 


417 M 


273 W 


166 


J 


42 


N 


... 718 


L. 


- 392 P 


243 B 


149 


Q 


38 


I 


... 711 


H. 


386 Y 


208 V 


136 


Z 


6 


R 


... 677 














i Hitt, 


Capt. Parker. 


Manual for the Solution of Military Ciphers. Army Service Schools Press, Fort 1 


Leavenworth* Kansas* 1916. 












res™ 


[OTEB- 




2-8 











REF ID: A5 68 95 





Table 6-A. — Frequency distribution of digraphs, based on 50,000 letters of Governmental plain-text 

telegrams; reduced to 5,000 digraphs 



Second Letter 

Total 

ABC D E PGH IJKL M N 0 PQR S T UVWXYZ “T“ Blanks 




alrj^li a> ■ ^ b " 






























REF ID: A5 68 95 



REOTRICTED 



Tables 7-11, Inclusive 

Absolute frequencies of digraphs, trigraphs, and tetragraphs and the logarithms of their 

assigned probabilities 1 t 

1. For each of the following 18 tables, the basic data were first arranged according to their 
absolute frequencies (F), and then the logarithms— L U (F) of the frequencies found. 

2. The tables are designed to facilitate determination of the relative weights or probability 
of occurrence of sets of digraphs, trigraphs, or tetragraphs, particularly with respect to various 
“matching” operations. For example, are the matched digraphs BE and ET more probable than 
the matched digraphs RT and EF? Table 7-A shows the frequencies (F) of the digraphs to be 
as follows: RE =98, ET=S7, RT=42, EF=18. Therefore, 98 times 87 is compared with 42 
times 18, or 8,626 with 756. This arithmetic method of approach is extremely cumbersome for 
a large number of comparisons. By using the logarithms of the individual frequencies, the opera- 
tion is greatly simplified, since the addition of the logarithms of two numbers is equivalent to 
the multiplication of their equivalent arithmetic values. Thus, the foregoing computation may 
be expressed as Log 98+Log 37, compared with Log 42-4-Log 18, or 0.96+0.79 versus 0.81+0.66 
(see Table 7-A and explanation below). If more than one occurrence of a particular digraph is 
involved, it is merely necessary to multiply the logarithmic value by the number of the occur- 
rences, viz., Log X+2(Log Y)+3(Log Z), as compared with Log A+3(Log B)+2(Log G). 

3. The logarithm of any given number is the power to which 10 must be raised to equal the 
given number. Thus, 10 2 =100, or the logarithm of 100=2. Similarly, 10* =1,000, or the loga- 
rithm of 1,000 = 3. The sum of logarithms is equal to the logarithm of the product of their antilogs 
(arithmetic numbers they represent). For example, 10 2 =100; 10*=1000; 10* +, =100X1000; Log 
100,000 = 5. Also, 10° = 1, or Log 1=0. The Log of 0 is minus infinity (- 00 ). 

4. In the compilation of the logarithms of the elements constituting these tables, frequencies 
of 1, of course, had a logarithmic value of 0.00. Digraphs which did not occur,* i.e., those with 
0 occurrences, had a logarithmic value of minus infinity (-<*>). For practical use, each of 
the original frequency occurrences in these tables was doubled; i. e., EN was given a frequency 
of 222 instead of 111, the frequency of RE became 196 instead of 98, etc. Thus, single occur- 
rences were doubled (2X1=2), and the logarithms of those elements became 0.30 instead of 0. 
This is equivalent to saying Log 1+Log 2=0.00+0.30=0.30. Those elements which occurred 
0 times, now were assumed to have ah occurrence of 1, with an equivalent logarithmic value of 0.00. 

5. In order to place all the logarithms of the initial frequencies on a comparable logarithmic 
basis, it was merely necessary to add 0.30 to each of them. While EN had a frequency of 111 
in the original compilation, it now had a frequency of 222, or 2(111). The logarithm of 222 is 
2.35. This is equivalent to saying Log 111+ Log 2=2.06+0.30=2.35. 

6. The frequencies as stated in terms of their actual logarithms do not readily indicate their 
relative size for each distribution. Therefore, the highest frequency in each group was given a 
value of 0.99, and the lowest a value of 0; frequencies intermediate between these extremes were 

i These frequency distributions are based upon data derived from 60,000 letters of U. 8. Governmental plain-text telegrams, reduced to 6,000 
digraphs. 

9 While in general it is possible to assign probability values to digraphs in accordance with their observed frequencies, it Is not Btrictly correct 
to associate the probability “0" with a frequency of zero. This would be equivalent to saying: "Because a specified digraph has not occurred, it 
cannot occur,” and would be reflected in the mathematics: "log probability zero equals minus infinity.” What may be said is: "Since a spoclfiod 
digraph has not occurred in the data its true probability value is unknown, except that it must be below the probability value assigned to a fre- 
quency of one.” The proper way to assign a probability value to digraphs with frequencies of zero Is to continue counting until they have at 
least one occurrence; then the true relative probability can bo found. 

A simple practical method of taking this difficulty into account is merely to assume that in twice the amount of data the digraph probably 
would have occurred at least once; that Is, it has a frequency of one-half. 

It should be pointed out, however, that since probabilities are multiplied (by summing logarithms) a 10% error in evaluating the digraph ZZ 
for example, makes tho product, wherever ZZ occurs, 10% wrong, and is just as serious os a 10% error in evaluating the high-frequency digraph EN. 

In practice, however, results obtained from the logarithmic method are so satisfactory that refinements are not needed. 

2-11 



REOTRICTED 



REF ID: A5 68 95 



RESTRICTED 



evaluated in proportion to their respective frequencies! 'fliia is equivalent to expressing the 
frequencies in logarithms with a base ot|ier than 10 . In other words, flits' procedure of don Voting' 
the logarithms to the rangte from .00 to .09 consists in dividing up the original Yange of logarithms- 
into 100 equal parts and assigning each one to the proper rank in the rang®’. 

7. The new base (C) used to convert each of the djgraphic frequencies to the logarithmic 
range 0 to 0.90 is derived as follows, when 222 is the highest frequency (F):- 

Lel‘228=C # - 9tf 
IiOgio 222=Logio C ° 00 
Logio 222 = (0.99) (Log 10 C) 

„ A , Logi 0 222 A x „- 2.35 

O = Anlilog -^ 99 - = Antilog Q ^ 

C =224 



8 . The formula for the computation of the logarithm to the new base (C) of any actual 
frequency (Y) of a series isi 



Log 0 Y = 



Login Y 

Logm (J 



II is more expeditious to use reciprocals in the conversion of a whole series of logarithmic values, 
ns in this instance. The formula is: (Logm C)" 1 . (Log lQ Y) =Log 0 Y. 

9. The digraphic index chart, Table 16, on page 37, summarizes the logarithmic frequencies 
of all English plain-iexl digraphs, computed to a base of 224. so that the logarithm of the highest 
frequency (EN) is 0.99. 

Example : EN «= 222 

Log io 222 = 2.35 

(Logio C ) _1 = (Logi 0 224)" 1 =0.421 
Log. 222 =0.421 X2.35 =0.99 

10* Likewise, the trigraphs and tetragraphs have been, computed to the 
bases L 586 and. Lehk, respectively, so that the logarithms of the highest- 
frequency trigraph (EHT) and tetragraph (TION) are 0*99* Since no use is 
being made of the trigraphs appearing less than 100 times and tetragraphs 
appearing less than 50 times, the basic frequencies of the trigraphs and 
tetragraphs have not been doubled in computing the new bases of the loga- 
rithms. 



2-12 



RESTRICTED 



REF ID : A56895 

RESTRICTED 



Table 7-A . — The 428 different digraphs of Table 6-A, arranged according to their absolute frequencies, 
accompanied by the logarithms of their assigned probabilities 



p 


Lm(F) 


Ij224 

(2F) 


P 


Lio(F) 


rnLum 


HHHI 


Lio(F) 


msm 


P 


Ljo(F) 


JjH 4 

<2F) 


EN 


Lll 


2.05 


.99 


DA.... 


32 


1.51 


.76 




ES 


1.28 


.67 


EQ-. 


12 


1.08 


.68 


RE 


98 


1.99 


.96 


EC.... 


32 


1.51 


.76 




m 


1.28 


.67 


0D — 


12 


1.08 


.68 


ER 


87 


1.94 


.94 


RS..__ 


31 


1.49 


.75 


ss..__ 


19 


1.28 


.67 


SF 


12 


1.08 


.58 


NT.... 


82 


1.91 


.93 


UR 


31 


1.49 


.75 


TS._._ 


19 


1.28 


.67 


US.... 


12 


1.08 


.58 


TH.... 


78 


1.89 


.92 


NI 


30 


1.48 


.75 


TT..._ 


19 


1.28 


.67 


UT.... 


12 


1.08 


.58 


ON.... 


77 


1.89 


.92 


RI 


30 


1.48 


.75 


WO.... 


19 


1.28 


.67 


VI.... 


12 


1.08 


.58 


IN 


75 


1.88 


.92 


EL.... 


29 


1.46 


.74 


BE 


18 


1.26 


.66 


WA._.. 


12 


1.08 


.58 


TE 


71 


1.85 


.91 


HT 


28 


1.45 


.74 


EF 


18 


1.26 


.66 


FF.._. 


11 


1.04 


.56 


AN.... 


64 


1.81 


.89 


LA.... 


28 


1.45 


.74 


NO.... 


18 


1.26 


.66 


FT.... 


11 


1.04 


.56 


OR 


64 


1.81 


.89 


RO.... 


28 


1.45 


.74 


PR.... 


18 


1.26 


.66 


PP.._ 


11 


1.04 


.56 


ST.... 


63 


1.80 


.88 


TA.._. 


28 


1.45 


.74 


AI 


17 


1.23 


.64 


RR.... 


11 


1.04 


.56 


ED.... 


60 


1.78 


.88 


*2.495 






HR.... 


17 


1.23 


. 64 


SU.... 


11 


1.04 


.56 


NE_._. 


57 


1.76 


.87 










PO.... 


17 


1.23 


. 64 


UE_... 


11 


1.04 


.56 


VE.„. 


57 


1.76 


.87 


AD.... 


27 


1.43 


.73 


RD 


17 


1.23 


.64 


YF 


11 


1.04 


.56 


ES 


54 


1.73 


.86 


DI__ 


27 


1.43 


.73 


TR..._ 


17 


1.23 


,.64 


YS 


11 


1.04 


. 56 


ND_... 


52 


1.72 


.85 


El.... 


27 


1.43 


.73 


DO.... 


16 


1.20 


.63 


FE 


10 


• 


.55 


TO.... 


50 


1.70 


.84 


IR.... 


27 


1.43 


.73 


DT 


15 


1.18 


.62 


IF.... 


10 


! 


.55 


SE 


49 


1.69 


.84 


IT.... 


27 


1.43 


.73 


IX.... 


15 


1.18 


.62 


LY.... 


10 




.55 


*1.249 






LL.... 


27 


1.43 


.73 


QU_... 


15 


1.18 


.62 


M0.... 


10 


IK 1 


.55 










NG.... 


27 


1.43 


.73 


SO.... 


16 


1.18 


.62 


SP.... 


10 


[If' ; 


.55 


AT.... 


47 


1.67 


.83 


ME, 


26 


1.41 


.72 


YT.__. 


15 


1.18 


.62 


Y0_... 


10 


If | 


.55 


TI 


45 


1.65 


.82 


NA_._. 


26 


1.41 


.72 


AC.... 


14 


1.15 


.61 


FR 


9 




.53 


AR.... 


44 


1.64 


.82 


SH 


26 


1.41 


.72 


AM.... 


14 


1.15 


.61 


IM.... 


9 


flf r 


.53 


EE.... 


42 


1.62 


.81 


IV_._ 


25 


1.40 


.72 


CH_... 


14 


1.15 


.61 


LD._.. 


9 


0.95 


.53 


RT.... 


42 


1.62 


.81 


OF.... 


25 


1.40 


.72 


CT.... 


14 


1.15 


.61 


MI.... 


9 


0.95 


.53 


AS 


41 




.80 


0M..._ 


25 


1.40 


.72 


EM 


14 


1.15 


.61 


NF 


9 


0.95 


.53 


CO.... 


41 


1.61 


.80 


OP.... 


25 


1.40 


.72 


GE 


14 


1.15 


.61 


RC 


9 


0.95 


.53 


10.... 


41 


1.61 


.80 


NS.... 


24 


1.38 


.71 


OS 


14 


1.15 


.61 


RM 


9 


0.95 


.53 


TY 


41 


1.61 


.80 


SA.... 


24 


1.38 


.71 


PA.... 


14 


1.16 


.61 


RY 


9 


0.95 


.53 


FO 


40 




.80 


IL____ 


23 


1.36 


.70 


AU..._ 


13 


1.11 


.59 


YE 


9 


0.96 


.53 


FI 


39 


1.59 


.80 


PE 


23 


1.36 


.70 


DS.... 


13 


1.11 


.59 


DD 


8 


0.90 


.61 


RA 


39 


1.59 


.80 


IC_... 


22 


1.34 


.69 


IE 


13 


1.11 


.59 


DF.... 


8 


0.90 


.51 


ET 


37 


1.57 


.79 


WE.... 


22 


1.34 


.69 


LO 


13 


1.11 


.59 


HU.... 


8 


0.90 


.51 


LE~.„ 


37 




.79 


UN.... 


21 


1.32 


.68 


MM 


13 


1.11 


.59 


IA 


8 


0.90 


.51 


OU.... 


37 


1.57 


.79 


CA..__ 


20 


1.30 


.67 


PL.... 


18 


1.11 


.59 


LT 


8 


0.90 


.51 


MA.... 


36 


1.56 


.78 


EP.._. 


20 


1.30 


.67 


RP-. 


13 


1.11 


.69 


MP 


8 


0.90 


.61 


TW.... 


36 


1.66 


.78 


EV— 


20 


1.30 


.67 


SC.... 


13' 


1.11 


.59 


NN_._. 


8 


0.90 


.51 


EA.... 


35 


1.64 


.78 


GH-. 


20 


1.30 


.67 


WI..__ 


13! 


1.11; 


.59 


OC_... 


8 


0.90 


.51 


IS.... 


35 


1.54 


.78 


HA._._ 


20 


1.30 


.67 


*3.745 






0W_... 


8 


0.90 


.51 


SI.... 


34 




.77 


HE.... 


20 


1.30 


.67 










PT__._ 


8 


0.90 


.51 


DE 


33 


1.52 


.77 


HO.... 


20 


1.30 


.67 ' 


AP.... 


12 


1.08 


.68 


UG.... 


8 


0.90 


.51 


HI.... 


33 


1.52 


.77 


LI.... 


20 


1.30 


.67 


AY.... 


12 


1.08 


.58 


AV 


7 


0.85 


.48 


AL-. 


32 


1.51 


.76 


IG.... 


19 


1.28 


.67 


DR.... 


12 


1.08 


.58 


BY 


7 


0.85 


.48 


CE 


32 


1.51 


.76 


NC-. 


19 


1.28 


.67 


E0..._ 


12 


1.08 


.58 


Cl 


7 


0.85 


.48 



* Tho IS digraphs above this lino compose of tl.o total. * The 122 digraphs above this JIne compose 75% of the total, 

s Thu 63 digraphs above this line compose 60% of Ihu total. 

2-13 



R ESTRICTED 



\ 

















REF ID: A56895 

RESTRICTED 



Table 7-A, Contd . — The 428 different digraphs of Table 8-A, arranged according to their 
absolute frequencies, accompanied by the logarithms of their assigned probabilities 



F 


L»(F) 


Lit* 

<2F> 


F 


L»(F) 




F 


£-»(F) 




F 


Iiio(F) 


0} 


EH 


7 




.48 


RU.™ 


5 


0.70 


.42 


GS 


3 


0.48 


.33. 


JE™. 


2 


m 


.25 


EW 


7 


0.85 


.48 


RV™. 


5 


0.70 


.42 


HC.™ 


3 


0.48 


.33 


JO™. 


2 


m 


.25 


EX 


7 


0.85 


.48 


SD 


5 


0.70 


.42 


HN 


3 


0.48 


.33 


JU.™ 


2 


EE 


.25 


GA 


7 


0.85 


.48 


SR.™ 


5 


0.70 


.42 


LB 


3 


0.48 


.33 


KI 


2 


m 


.25 


IP..„ 


7 


0.85 


.48 


TL 


5 


0.70 


.42 


LC 


3 


0.48 


.33 


LM.™ 


2 




.25 


NU.„. 


7 


0.85 


.48 


TU 


5 


0.70 


.42 


LF 


3 


0.48 


.33 


LR.™ 


2 


si 


.25 


OA.™ 


7 


0.86 


.48 


UA 


5 


0.70 


.42 


LP.™ 


3 


0.48 


.33 


LU.™ 


2 




.25 


OV.™ 


7 


0.85 


.48 


UI.™ 


5 


0.70 


.42 


MC 


3 


0.48 


.33 


LV™. 


2 


m 


.25 


RG.„. 


7 


0.85 


.48 


UM 


5 


0.70 


.42 


NP 


3 


0.48 


.33 


LW.™ 


2 


0.30 


.25 


RN™. 


7 


0.85 


.48 


AF 


4 


0.60 


.38 


NV.™ , 


3 


0.48 


.33 


MR. 


2 




.25 


TF™. 


7 


0.85 


.48 • 


BA 


4 


0.60 


.38 


NW ' 


3 


0.48 


.33 


MT.™ 


2 


0.30 


.25 


TN™. 


7 


0.85 


.48 


BO 


4 


0.60 


.38 


OE.™ 


3 


0.48 


.33 


MU™. 


2 


EE 


.25 


XT.™ 


7 


0.85 


.48 


CK..„ 


4 


0.60 


.38 


OH 


3 


0.48 


.33 


MY.™ 


2 


m 


.25 


AB.™ 


6 


0.78 


.45 


CR.™ 


4 


0.60 


.38 


PH 


3 


0.48 


.33 


NB 


2 




.25 


AG„„ 


6 


0.78 


.45 


CU„_ 


4 


0.60 


.38 


PU™. 


3 


0.48 


.33 


NK„_ 


2 


0.30 


.25 


BL.._ 


6 


0.78 


.45 


DB 


4 


0.60 


.38 


RH 


3 


0.48 


.33 


OG.™ 


2 




.25 


GO™. 


e 


0.78 


.45 


DC.„ 


4 


0:60 


.38 


SB.... 


3 


0.48 


.33 


OK.... 


2 


0.30 


.25 


ID.... 


6 


0.78 


.45 


DN 


4 


0.60 


.38 


SM 


3 


0.48 


.33 


OY.™ 


2 


EE 


.25 


KE„. 


6 


0.78 


.45 


DW.™ 


4 


0.60 


.38 


TB 


3 


0.48 


.33 


PF.™ 


2 


m 


.25 


LS™. 


6 


0.78 


.45 


EB_... 


4 


0.60 


.38 


UB.... 


3 


0.48 


.33 


RB 


2 


8$ 


.25 


MB™. 


6 


0.78 


.45 


EG.... 


4 


0.60 


.38 


UC.™ 


3 


0.48 


.33 


SG.™ 


2 


m 


.25 


00.... 


6 


0.78 


.45 


EY 


4 


0.60 


.38 


UD 


3 


0.48 


.33 


SL 


2 


0.'30 


.25 


PI.™ 


6 


0.78 


.45 


GT 


4 


0.60 


.38 


YI 


3 


0.48 


.33 


TP.™ 


2 


0.30 


.25 


PS.™ 


6 


0.78 


.45 


HS.™ 


4 


0.60 


.38 


YP.._ 


3 


0.48 


.33 


UP.„ 


2 


0.30 


.25 


RF.™ 


6 


0.78 


.45 


MS._ 


4 


0.60 


.38 


AH.... 


2 


0.30 


.25 


WN™. 


2 


0.30 


.25 


TC.™ 


6 


0.78 


.45 


NH 


4 


0.60 


.38 


AK 


2 


0.30 


.25 


XA.™ 


2 


0.30 


.25 


TD 


6 


0.78 


.45 


NR 


4 


0.60 


.38 


AO 


2 


0.30 


.25 


xc.™ 


2 




.25 


TM 


6 


0.78 


.45 


OB 


4 


0.60 


.38 


BI 


2 


0.30 


.25 


XI.... 


2 


0.30 


.25 


UL 


6 


0.78 


.45 


PM 


4 


0.60 


.38 


BR.™ 


2 


0.30 


.25 


XP.™ 


2 




.25 


VA.... 


6 


0.78 


.45 


RW 


4 


0.60 


.38 


BU.™ 


2 


0.30 


.25 


YB.™ 


2 


0.30 


.25 


YA.™ 


6 


0.78 


. 45 


SN — 


4 


0.60 


.38 


DG.™ 


2 


0.30 


.25 


YL.™ 


2 




.25 


YN.™ 


6 


0.78 


.45 


S W.™ 


4 


0.60 


.38 


DH.™ 


2 


0.30 


.25 


YM.™ 


2 


0.30 


.25 


CL.... 


5 


0.70 


.42 


WH„. 


4 


0.60 


.38 


DQ.™ 


2 


0.30 


.25 


ZE.™ 


2 


0.30 


.25 


DM.... 


5 


0.70 


.42 


YC.™ 


4 


0.60 


.38 


FC.™ 


2 


0.30 


.25 


AE.™ 


1 




.13 


DP.™ 


6 


0.70 


.42 


YD.™ 


4 


0.60 


.38 


FL.™ 


2 


0.30 


.25 


AJ 


1 




.13 


DU.™ 


5 


0.70 


.42 


YR.._ 


4 


0.60 


.38 


GC.... 


2 


0.30 


.25 


BJ 


1 




.13 


FA.... 


5 


0.70 


.42 


AA.... 


8 


0.48 


.33 


GF.... 


2 


0.30 


.25 


BM.™ 


ll 




.13 


GI.™ 


5 


0.70 


.42 


AW.™ 


3 


0.48 


.33 


GL.... 


2 


0.30 


.25 


BS.™ 


1 




.13 


GR.... 


5 


0.70 


.42 


CC.™ 


3 


0.48 


.33 


GP.™ 


2 


0.30 


.25 


BT.___ 


1 




.13 


HF 


5 


0.70 


.42 


DL 


3 


0.48 


.33 


GU 


2 


0.30 


.25 


CD.... 


1 




.13 


NL 


5 


0.70 


.42 


. DV 


3 


0.48 


.33 


HD — 


2 


0.30 


.25 


CF_... 


1 




.13 


NM 


5 


0.70 


.42 


EU 


3 


0.48 


.33 


HM 


2 


0.30 


.25 


CM.... 


1 




.13 


NY.... 


5 


0.70 


.42 


FS 


3 


0.48 


.33 


IB.... 


2 


0.30 


.25 


CN.™ 


1 




.13 


01 .™ 


5 


0.70 


.42 


FU.... 


3 


0.48 


.33 


IK.... 


2 


0.30 


.25 


CS.™ 


1 




.13 


RL .. 


5 


0.70 


.42 


GN.__. 


3 


0.4S 


.33 


IZ.__. 


2 


0.30 


.25 


cw.™ 


1 




.13 



2-14 



RESTRICTED 












REF ID: A5 68 95 




Table 7-A, Concluded. — The 428 different digraphs of Table 6-A, arranged according to their 
absolute frequencies, accompanied by the logarithms of their assigned probabilities 



F 


L«(F) 


Irtlt 

(2F) 


F 


Lio(F) 


(2F) 


F 


IMF) 


■Pf 

Kh 


F 


Lio(F) 


Liu 

<2F) 


CY 


1 


0.00 


.IS 


HW— 


1 


0.00 


.13 


PD 


1 


0.00 


.13 




B 


0.00 


.13 


DJ..„ 


1 


0.00 


.13 


HY 


1 


0.00 


.18 


PN— 


1 


0.00 


.13 




m 


0.00 


.13 


DY 


1 


0.00 


.13 


JA 


1 


0.00 


.18 


PV 


1 


0.00 


.13 


ws..„ 


i 


0.00 


.18 


EJ 


1 


0.00 


.13 


KA 


1 


0.00 


.13 


PW 


1 


0.00 


.13 


WY— 


i 


0.00 


.13 


EZ 


1 


0.00 


.18 


KC 


1 


0.00 


.13 


PY— 


1 


0.00 


.13 


XD 


i 


0.00 


.13 


FD 


1 


0.00 


.13 


KL 


1 


0.00 


.13 


QM — 


1 


0.00 


.13 


XE 


i 


0.00 


.13 


FG 


1 


0.00 


.13 


KN 


1 


0.00 


.13 


QR 


1 


0.00 


.13 


XF.... 


i 


0.00 


.13 


FM 


1 


0.00 


.13 


KS 


1 


0.00 


.18 


RJ 


1 


0.00 


.13 


XH— 


i 


0.00 


.13 


FP 


1 


0.00 


.13 


LG 


1 


0.00 


.13 


RK.„.. 


1 


0.00 


.13 


XN — 


i 


0.00 


.13 


FW 


1 


0.00 


.13 


LH 


1 


0.00 


.13 


SK — 


1 


0.00 


.13 


XO— 


i 


0.00 


.13 


FY 


1 


0.00 


.13 


LN 


1 


0.00 


.13 


SV— 


1 


0.00 


.13 


XR— 


i 


0.00 


.13 


GD 


1 


0.00 


.13 


MD 


1 


0.00 


.13 


SY 


1 


0.00 


.13 


XS— 


i 


0.00 


.13 


GG 


1 


0.00 


.13 


MF 


1 


0.00 


.13 


TG 


1 


0.00 


.13 


YG 


i 


0.00 


.13 


GJ 


1 


0.00 


.13 


MH 


1 


0.00 


• 1? 


TQ 


1 


0.00 


.13 


YH 


i 


0.00 


.13 


GM 


1 


0.00 


.13 


NJ 


1 


0.00 


.13 


TZ 


1 


0.00 


.13 


YU 


i 


0.00 


.13 


GW 


1 


0.00 


.13 


NQ 


1 


0.00 


.13 


UF 


1 


0.00 


.13 


YW— 


i 


0.00 


.13 


HB 


1 


0.00 


.13 


OiI- 


1 


0.00 


.13 


UO 


1 


0.00 


.13 


ZA 


i 


0.00 


.13 


HL 


1 


0.00 


.13 


OX— 


1 


0.00 


.13 


UV 


1 


0.00 


.13 


ZI 


i 


0.00 


.13 


HP 


1 


0.00 


.13 


PB— 


1 


0.00 


.13 


VO 


1 


0.00 


.13 J 


5.000 






HQ 


1 


O.OOl 


.13 


PC.... 


1 


0.00 


.13 


VT 


1 


0.00 


.13 , 











Table 7-B. — The 18 digraphs composing 25% of the digraphs in Table 6-A, accompanied by the 
logarithms of their assigned probabilities, arranged alphabetically according to their initial letters 



(1) AND ACCORDING TO THEIR FINAL (2) AND ACCORDING TO THEIR ABSOLUTE 

LETTERS FREQUENCIES 



F 


IMF) 


■H 


F 


LioCF) 


mmm 


F 


IMF) 


wm. 


F 


IMF) 


mmm 


AN.... 


64 


1.81 


.89 


ON.... 


77 


1.89 


.92 


AN.. 


.. 64 


1.81 


.89 


ON.... 


77 


1.89 


.92 










OR.... 


64 


1.81 


.89 










OR.... 


64 


1.81 


.89 


ED.... 


60 


1.78 


.88 


RE.... 


98 


1.99 


.96 


EN.. 


..111 


2.05 


.99 


RE.... 


98 


1.99 


.96 


EN.... 


111 


2.05 


.99 










ER.. 


.. 87 


1.94 


.94 










ER 


87 


1.94 


.94 


SE 


49 


1.69 


.84 


ED.. 


.. 60 


1.78 


.88 


ST.... 


63 


1.80 


.88 


ES 


54 


1.73 


.86 


ST 


63 


1.80 


.88 


ES.. 


.. 54 


1.73 


.86 


SE— 


49 


1.69 


.84 










TE.... 


71 


1.85 


.91 




i 






TO- 


78 


1.89 


.92 


IN.... 


75 


1.88 


.92 


TH.... 


78 


1.89 


.92 


IN- 


.. 75 


1.88 


.92 


TE.... 


71 


1.85 


.91 






i 


1 


TO— 


50 


1.70 


.84 










TO— 


50 


1.70 


.84 


ND._„ 


52 


1.72 


.85 


VE.._. 


57 


1.76 


.87 


NT.. 


... 82 


1.91 


.93 


VE— 


57 


1.76 


.87 


NE.___ 


57 


1.76 


.87 


1, 


249 






NE.. 


... 57 


1.76 


.87 


1, 


249 






NT.... 


82 


1.91 


.93 


r 








ND„ 


_ 52 


Ena 


.85 











2-15 



- REQTRICTED " 


























REF ID: A5 68 95 




Table 7-C. — The 58 digraphs composing 50% of the 5,000 digraphs of Table 6-A, accompanied by 
the logarithms of their assigned probabilities, arranged alphabetically according to their initial letters 



(1) AND ACCORDING TO THEIR PINAL (2) AND ACCORDING TO THEIR ABSOLUTE 

LETTERS FREQUENCIES 



F 


Lio(F) 


B9 


. F 


Lio(F) 


I.9M 

<2F) 


F 


Lu(F) 


■H 


F 


Lio(F) 


Xitti 

(2F) 


AL 


32 


1.51 


.76 


MA 


36 


1.66 


.78 


AN.... 


64 


1.81 


.89 


MA.... 


36 


1.66 


.78 


AN 


64 


1.81 


.89 










AT.... 


47 


1.67 


.83 










AR 


44 


1.64 


.82 


ND 


52 


1.72 


.85 


AR.... 


44 


1.64 


.82 


NT.... 


82 


1.91 


.93 


AS.... 


41 


1.61 


.80 


NE 


57 


1.76 


.87 


AS.... 


41 


1.61 


.80 


NE— 


57 


1.76 


.87 


AT.... 


47 


1.67 


.83 


NI 


30 


1.48 


.75 


AL.... 


32 


1.51 


.76 


ND.... 


52 


1.72 


.85 










NT 


82 


1.91 


.93 










NI— 


30 


1.48 


.75 


CE 


32 


1.51 


.76 










CO.... 


41 


1.61 


.80 










CO.... 


41 


1.61 


.80 


ON.... 


77 


1.89 


.92 


CE.... 


32 


1.51 


.76 


ON— 


77 


1.89 


.92 










OR.... 


64 


1.81 


.89 










OR— 


64 


1.81 


.89 


DA_.. 


32 


1.51 


.76 


OU— 


37 


1.57 


.79 


DE.._ 


33 


1.52 


.77 


OU— 


37 


1.57 


.79 


DE.... 


33 


1.62 


.77 










DA.... 


32 


1.51 


.76 


















RA— 


39 


1.59 


.80 










RE.... 


98 


1.99 


.96 


EA— 


35 


1.54 


.78 


RE.... 


98 


1.99 


.96 


EN.... 


111 


2.05 


.99 


RT.... 


42 


1.62 


.81 


EC.... 


32 


1.51 


.76 


RI— 


30 


1.48 


.75 


ER.... 


87 


1.94 


.94 


RA.... 


39 


1.59 


.80 


ED.... 


60 


1.78 


.88 


RO— 


28 


1.46 


.74 


ED.... 


60 


1.78 


.88 


RS— 


31 


1.49 


.75 


EE.... 


42 


1.62 


.81 


RS 


31 


1.49 


.75 


ES.... 


54 


1.73 


.86 


RI— 


30 


1.48 


.76 


EL.... 


29 


1.46 


.74 


RT 


42 


1.62 


.81 


EE.... 


42 


1.62 


.81 


RO— 


28 


1.45 


.74 


EN 111 


2.05 


.99 










ET 


37 


1.57 


.79 










ER.... 


87 


1.94 


.94 


SE— 


49 


1.69 


.84 


EA 


35 


1.54 


.78 


ST— 


63 


1.80 


.88 


ES.._. 


54 


1.73 


.86 


SI.... 


34 


1.53 


.77 


EC 


32 


1.51 


.76 


SE— 


49 


1.69 


.84 


ET 


37 


1.67 


.79 


ST.... 


63 


1.80 


.88 


EL— 


29 


1.46 


.74 


SI— 


34 


1.53 


.77 


FI 


39 


1.59 


.80 


TA- 


28 


1.45 


.74 


FO 


40 


1.60 


.80 


TO- 


78 


1.89 


.92 


FO 


40 


1.60 


.80 


TE— 


71 


1.85 


.91 


FI 


39 


1.69 


.80 


TE— 


71 


1.85 


.91 










TH— 


78 


1.89 


.92 










TO— 


50 


1.70 


.84 


HI— 


33 


1.52 


.77 


TI- 


45 


1.65 


.82 


HI 


33 


1.52 


.77 


TI— 


45 


1.65 


.82 


HT— 


28 


1.45 


.74 


TO— 


50 


1.70 


.84 


HT 


28 


1.45 


.74 


TY.... 


41 


1.61 


.80 










Tff 


36 


1.56 


.78 










TW— 


36 


1.66 


.78 


IN.... 


75 


1.88 


.92 


TY 


41 


1.61 


.80 


IN 


75 


1.88 


.92 


TA— 


28 


1.45 


.74 


10.... 


41 


1.61 


.80 










10 


41 


1.61 


.80 










IS— 


35 


1.64 


.78 


UR 


31 


1.49 


.75 


IS- 


35 


1.54 


.78 


UR— 


31 


1.49 


.75 


LA.... 


28 


1.45 


.74 


VE 


57 


1.76 


.87 


LE- 


37 


1.57 


.79 


VE— 


57 


1.76 


.87 


LE.... 


37 


1.57 


.79 


2,495 






LA.... 


28 


1.45 


.74 


2,495 




t 



16 

















REF ID: A56895 



nEOTfllCTED 



Table 7-D . — The 122 digraphs composing 75% of the 5,000 digraphs of Table 6-A, accompanied 
by the logarithms of their assigned probabilities, arranged alphabetically according to their 
initial letters 



* ■ , . T 

(1) AND ACCORDING TO THEIR FINAL LETTERS 



F 


L»(P) 




F 


rwF) 


■qi 

■33S 


F 


L»(F) 


■fy 

Kill 


F 


Lw(F) 


MEM 

ESI 


AC 


14 


1.15 


.61 


ER™ 


87 


1.94 


.94 


MA... 


36 


1.56 


.78 


RS™. 


31 


1.49 


.75 


AD 


27 


1.43 


.73 


ES™ 


54 


1.73 


.86 


ME... 


26 


1.41 


.72 


RT 


42 


1.62 


.81 


AX 


17 


1.23 


.64 


ET.„ 


37 


1.57 


.79 


















AL 


32 


1.51 


.76 


EV_. 


20 




.67 


NA... 


26 


1.41 


.72 


SA 


24 


1.38 


.71 


AM 


14 


1.15 


.61 










NC... 


19 


1.28 


.67 


SE 


49 


1.69 


.84 


AN.... 


64 


1.81 


.89 


FI_ 


39 


1.59 


.80 


ND... 


52 


1.72 


.85 


SH 


26 


1.41 


.72 


AR 


44 


1.64 


.82 


FO™ 


40 


1.60 


.80 


NE.__ 


57 


1.76 


.87 


SI™. 


34 


1.53 


.77 


AS.... 


41 


1.61 


.80 










NG... 


27 


1.43 


.73 


SO™. 


15 


1.18 


.62 


AT.... 


47 


1.67 


.83 


GE™ 


14 


1.15 


.61 


NI... 


30 


1.48 


.75 


ss.... 


19 


1.28 


.67 


AU-... 


13 


1.11 


.59 


GH„. 


20 


1.30 


.67 


NO... 


18 


1.26 


.66 


ST.... 


63 


1.80 


.88 


BE 


18 


1.26 


.66 










NS... 


24 


1.38 


.71 










HA... 


20 


1.30 


.67 


NT... 


82 


1.91 


.93 


TA.™ 


28 


1.45 


.74 


CA 


20 


1 20 


07 


HE... 


20 


1.30 


.67 










TE™. 


71 


1.85 


.91 


ft? 


22 


JL* WV 


i VI 

70 


HI... 


33 


1.52 


.77 


OF... 


25 


1.40 


.72 


TH_.. 


78 


1.89 


.92 


wCi 

flu 


o& 

1 A 


JL • 01 


• iO 
01 


HO... 


20 


1.30 


.67 


OL... 


19 


1.28 


.67 


TI™. 


45 


1.65 


.82 


un — _ 

no 


41 


1* J.U 


20 


HR... 


17 


1.23 


.64 


OM... 


25 


1.40 


.72 


TO.... 


50 


1.70 


.84 


wU.... 

CT 


fr JL 

14 


A • UA 

1 1 R 


• ou 
01 


HT... 


28 


1.45 


.74 


ON... 


77 


1.89 


.92 


TR.™ 


17 


1.23 


.64 




A • AU 


. UA 










OP... 


25 


1.40 


.72 


TS.._ 


19 


1.28 


.67 


DA.... 


32 


1.51 


.76 


IC... 


. 22 


1.34 


.69 


OR... 


. 64 


1.81 


.89 


TT..._ 


19 


1.28 


.67 


DE 


33 


1.52 


.77 


IE... 


. 13 


1.11 


.59 


OS... 


. 14 


1.15 


.61 


TW 


36 


1.56 


.78 


DI 


27 


1.43 


.73 


IG... 


. 19 


1.28 


.67 


OT... 


. 19 


1.28 


.67 


TY™. 


41 


1.61 


.80 


DO 


16 


1.20 


.63 


IL... 


. 23 


1.36 


.70 


OU... 


. 37 


1.57 


.79 










DS 


13 


1.11 


1 .59 


IN... 


. 75 


1.88 


.92 










UN- 


21 


1.32 


.68. 


DT 


15 


1.18 


.62 


10 ... 


. 41 


1.61 


.80 


PA... 


. 14 


1.15 


.61 


UR.... 


31 


1.49 


.75 










IR... 


. 27 


1.43 


.73 


PE... 


. 23 


1.36 


.70 










EA 


35 


1.64 


.78 


IS... 


. 35 


1.64 


.78 


PO... 


. 17 


1.23 


.64 


VE™. 


57 


1.76 


.87 


EC 


32 


1.51 


.76 


IT... 


. 27 


1.43 


.73 


PR... 


. 18 


1.26 


.66 










ED 


60 


1.78 


.88 


IV... 


. 25 


1.40 


.72 ’ 










WE.... 


22 


1.34 


.69 


EE 


42 


1.62 


.81 


IX... 


. 15 


1.18 


.62 


QU... 


. 15 


1.18 


.62 


W0„. 


19 


1.28 


.67 


EF 


18 


1.26 


.66 


























El 


27 


1.43 


.73 


LA... 


. 28 


1.45 


.74 


RA... 


. 39 


1.59 


.80 


YT.i.~ 


15 


1.18 


.62 


EL 


29 


1.46 


.74 


LE... 


. 37 


1.57 


.79 


RD... 


. 17 


1.23 


.64 


3,' 


745 






EM.... 


14 


1.15 


. 61 


LI... 


. 20 


1.30 


.67 


RE... 


. 98 


1.99; 


.96 








EN 111 


2.05 


.99 


LL... 


. 27 


1.43 


.73 


RI„ 


. 30 


1.48 


.75 










EP— 


20 


1.30 


.67 


LO... 


. 13 


1.11 


.59 


RO.,. 


. 28 


1.45 


.74 


, 


1 















REF ID: A5 68 95 



Ull.kiJ.UlU 1JUU 



Table 7-D, Concluded . — The 122 digraphs composing 75% of the 5,000 digraphs of Table 6-A, 
accompanied by the logarithms of their assigned probabilities, arranged alphabetically according 
to their initial letters 



(2) AND ACCORDING TO THEIR ABSOLUTE FREQUENCIES 




Table 7- E . — All the 128 digraphs of Table 6-A, arranged first alphabetically according to their 
initial letters and then alphabetically according to their final letters . 

(SEE TABLE 6-A.— READ ACROSS THE ROWS) 




2 - 18 


















REF ID: A56895 



RESTRICTED 



Table 8. — The 1$8 different digraphs of Table 6-A, arranged first alphabetically according to their 
initial letters and then according to their absolute frequencies under each initial letter, 1 accompanied 
by the logarithms of their assigned probabilities 




1 For arrangement alphabetically first under initial letters and then under final letters, see Table 6-A. 

2-19 








RESTRICTED 



REF ID: A56895 



HHTrJ.MW 



Tadlb 8, Contd . — The J$8 different digraphs of Tails <S-A, arranged first alphabetically according 
to their initial letters and then according to t heir absolute frequencies under each initial letter, 1 
accompanied by tlte logarithms of their assigned probabilities 




2-2Q 













~ REO TRIG TED 



REF^ 



A5 68 95 



‘ \ 

V 

Tablh 8, Concluded . — The 128 different difraqlis of Table 6-A, arranged first alphdbeticaMy accord- 
ing to their initial letters and then according to their absolute frequencies under each initial letter, 1 

• _ 1 T. if 1 *»T « • • • ■» 7. 



F 


Lia(F) 


Liu 

(ZF) 


F 


| Ljb(F) 


f'Tfr-i 

(2F) | 


F 


WF) 


■^1 


F 


140(F) 


tmm 


RE 


98 


1.99 


19 


SR.... 


5 


HBH 


m 


US— 


12 


HB! 


.58 


XI— 


2 


0.30 


.25 


RT 


42 


1.62 




SN.._ 


4 


MBit] 


IBal 


UT— 


12 




.58 


XP— 


2 


0.30 


.25 


RA 


39 


1.59 


EH 


SW 


4 




mm 


UE 


11 


HQ 


.56 


XD— 


1 


0.00 


.13 


RS 


31 


1.49 


.75 


SB 


3 


0.48 


.33 


UG 


8 


HR? 


.51 


XE 


1 


0.00 


.13 


RI 


30 


1.48 


.75 


SM. 


3 


0.48 


.33 


UL 


6 


HR? 


.45 


XF 


1 


0.00 


.13 


RO — 


28 


1.46 


.74 


SG 


2 


0.30 


.26 


UA 


5 


0.70 


.42 


XH 


1 


0.00 


.13 


RD 


17 


1.23 


.64 


SL 


2 


0.30 


.25 


UI— 


5 


0.70 


.42 


XN 


1 


0.00 


.13 


RP 


13 


1.11 


.59 


SK. 


1 




.13 


UM 


5 


0.70 


.42 


X0„_ 


1 


0.00 


.13 


RR — 


11 


1.04 


.56 


SV__ 


1 




.13 


UB 


3 


0.48 


.33 


XR— 


1 


0.00 


.13 


RC 


9 


0.95 


.53 


SY 


1 




.13 


UC— 


3 


0.48 


.33 


XS— 


1 


0.00 


.13 


RM 


9 


0.95 


.53 










UD 


3 


0.48 


.33 










RY 


9 


0.95 


.53 


TH 


78 


1.89 


.92 


UP.... 


2 


0.30 


.25 


YT 


15 


1.18 


.62 


RG 


7 


0.85 


.48 


TE 


71 


1.85 


.91 


UF 


1 


0.00 


.13 


YF 


11 


1.04 


.56 


RN 


7 


0.86 


.48 


TO 


50 




.84 


UO_... 


1 


0.00 


.13 


YS 


11 


1.04 


.56 


RF 


6 


0.78 


.45 


TI 


45 


1.65 


.82 


UV.... 


1 


0.00 


.13 


YO 


10 


1.00 


.55 


RL 


5 


0.70 


.42 


TY 


41 


1.61 


.80 










YE 


9 


0.95 


.53 


RU 


5 




.42 


TW 


36 


1.56 


.78 


VE— 


57 


1.76 


.87 


YA 


6 


0.78 


.45 


RV 


5 


0.70 


.42 


TA 


28 


1.45 


.74 


VI.... 


12 


1.08 


.58 


YN— 


6 


0.78 


.45 


Rff 


4 




.38 


TS 


19 


1.28 


.67 


VA.... 


6 


0.78 


.45 


YC 


4 


0.60 


.38 


RH 


3 


EES 


.33 


TT 


19 


1.28 


.67 


VO.... 


1 


0.00 


.13 


YD 


4 


0.60 


.88 


RB 


2 


rm 


.25 


TR 


17 


1.23 


.64 


VT.... 


1 


0.00 


.13 


YR 


4 


0.60 


.38 


RJ 


1 




.13 


TF 


7 


0.85 


.48 










YI 


3 


0.48 


.33 


RK 


1 




.13 


TN. 


7 


0.85 


.48 


WE.... 


22 


1.34 


.69 


YP 


8 


0.48 


.33 






■ 




TC 


6 


0.78 


.45 


WO.... 


19 


1.28 


.67 


YB 


2 


0.30 


.26 


ST 


63 




.88 


TD 


6 


0.78 


.45 


WI__ 


13 


1.11 


.59 


YL 


2 


0.30 


.25 


SE 


49 


1.69 


.84 


TM.... 


6 


0.78 


.45 


WA— 


12 


1.08 


.58 


YM 


2 


0.30 


.25 


SI 


34 


1.53 


.77 


TL.... 


5 




.42 


WH.... 


4 


0.60 


.38 


YG 


1 


0.00 


.13 


SH 


26 


1.41 


.72 


TU 


5 




.42 


WN.... 


2 


0.30 


.25 


YH 


1 


0.00 


.13 


SA 


24 


1.38 


.71 


TB 


3 


0.48 


.33 


WL.... 


1 


0.00 


.13 


YU 


1 


0.00 


.13 


SS 


19 


1.28 


.67 


TP 


2 


ESQ 


.25 


WR.... 


1 


0.00 


.13 


YW 


1 


0.00 


.13 


SO 


16 


1.18 


.62 


TG. 


1 


f 2 


.13 


WS.... 


1 


0.00, 


.13 










SC.._ 


13 


1.11 


.59 


TQ 


1 




.13 


WY.... 


1 


0.00 


.13 


ZE 


2 


0.30 


.25 


SF 


12 




.58 


TZ 


1 




.13 










ZA 


1 


0.00 


.13 


SU 


11 




.56 










XT.... 


7 


0.85 


.48 


ZI. 


1 


0.00 


.13 


SP 


10 




.55 


UR— 


31 


1.49 


.75 


XA.... 


2 


0.30 


.25 


S.000 






SD 


5 




.42 


UN— 


21 


1.32 


.68 


XC.... 


2 


0.30 


.25 











1 For arrangement alphabetically first under initial letters and then under final letters, see Table 6-A. 



2-21 













Table' 9-*A . — The 428 different digraphs of Table 6-A, 'arranged first alphabetically according to 
their final letters and then according to their absolute frequencies, accompanied by the logarithms 
of their assigned probabilities 



F 


Li,(F) 


Li324 

(2F) 


F 


Lio(F) 


MaSai 


F 


Lw(F) 


Lim 

(2F) 


F 


Lio(F) 


LlM 

<2F) 


RA 


39 


1.59 


.80 


EC 


32 


MB 


.76 


RE.... 


98 


1.99 


.96 


GF 


2 


0.30 


.25 


MA 


36 


1.56 


.78 


IC.„. 


22 




.69 


TE.... 


71 


1.85 


.91 


PF 


2 


0.30 


.25 


EA.... 


35 


1.54 


.78 


NC 


19 


Ej 


.67 


NE.... 


57 


1.76 


.87 


CF_... 


1 


0.00 


.13 


DA 


32 


1.61 


.76 


AC 


14 


1.15 


.61 


VE.... 


57 


1.76 


.87 


MF 


1 


0.00 


.13 


LA 


28 


1.45 


.74 


SC.... 


13 


1.11 


.59 


SE 


49 


1.69 


.84 


UF 


1 


0.00 


.13 


TA 


28 


1.45 


.74 


RC.... 


9 


0.95 


.53 


EE.... 


42 


1.62 


.81 


XF 


1 


0.00 


.13 


NA 


26 


1.41 


.72 


OC.„. 


8 


0.90 


.51 


LE 


37 


1.57 


.79 










SA 


24 


1.38 


.71 


TC.... 


6 


0.78 


.45 


DE.... 


33 


1.52 


.77 










CA..„ 


20 


1.30 


.67 


DC r ... 


4 


0.60 


.38 


CE 


32 


1.51 


.76 


NG 


27 


1.43 


.73 


HA 


20 


1.30 


.67 


YC 


4 


0.60 


.38 


ME.... 


26 


1.41 


.72 


IG 


19 


1.28 


.67 


PA 


14 


1.15 


.61 


cc.... 


3 


0.48 


.33 


PE.... 


23 






UG— 


8 


0.90 


.51 


WA„.„ 


12 


1.08 


.58 


HC.... 


3 


0.48 


.33 


WE.... 


22 


1.34 


.69 


RG 


7 


0.85 


.48 


IA 


8 


0.90 


.51 


LC.... 


3 


0.48 


.33 


HE.... 


20 






AG.... 


6 


0.78 


.45 


GA 


7 


0.85 


.48 


MC 


3 


0.48 


.33 


BE.... 


18 


1.26 


.66 


EG.... 


4 


0.60 


.38 


0A..„ 


7 


0.85 


.48 


uc.... 


3 


0.48 


.33 


GE 


14 


1.15 




DG..._ 


2 


0.30 


.25 


VA 


6 


0.78 


.45 


FC_... 


2 


0.30 


.25 


IE.... 


13 


1.11 


.59 


OG.... 


2 


0.30 


.25 


YA 


6 


0.78 


.45 


GC.... 


2 


0.30 


.25 


UE.... 


11 




.66 


SG.... 


2 


0.30 


.25 


FA 


6 


0.70 


.42 


XC.._ 


2 


0.30 


.25 


FE 


10 




.55 


FG.... 


1 


0.00 


.13 


UA 


5 


0.70 


.42 


KC..._ 


1 


0.00 


.13 


YE.... 


9 


0.95 




GG.... 


1 


0.00 


.13 


BA 


4 


0.60 


.38 


PC.._ 


1 


0.00 


.13 


KE.... 


6 


0.78 


.45 


LG.... 


1 


0.00 


.13 


AA 


3 


0.48 


.33 










OE.... 


3 


0.48 


.33 


TG.... 


1 


0.00 


.13 


XA 


2 


0.30 


.25 










JE.... 


2 


0.30 




YG.... 


1 


0.00 


.13 


JA 


1 


0.00 


.13 


ED.... 


60 


1.78 


.88 


ZE 


2 


0.30 












KA 


1 


0.00 


.13 


ND 


52 


1.72 


.85 


AE 


1 




.13 










ZA 


1 


0.00 


.13 


AD 


27 


1.43 


.73 


XE 


1 




.13 


















RD 


17 


1.23 


.64 










TH.... 


78 


1.89 


.92 


AB_.„ 


6 


0.78 


.45 


OD.... 


12 


1.08 


.58 










SH.... 


26 


1.41 


.72 


MB.... 


6 


0.78 


.45 


LD.... 


9 


0.95 


.53 










GH.... 


20 


1.30 


.67 


DB 


4 


0.60 


.38 


DD 


8 


0.90 


.51 


OF.... 


25 




.72 


CH_... 


14 


1.15 


.61 


EB 


4 


0.60 


.38 


ID 


6 


0.78 


.45 


EF___. 


18 


1.26 


. 66 


EH.... 


7 


0.85 


.48 


OB 


4 


0.60 


.38 


TD 


6 


0.78 


.45 


SF.___ 


12 




.58 


NH.... 


4 


0.60 


.38 


LB.... 


3 


0.48 


.33 


SD 


5 


0.70 


.42 


FF.... 


11 




.56 


WH.... 


4 


0.60 


.38 


SB.... 


3 


0.48 


.33 


YD.... 


4 


0.60 


.38 


YF.... 


11 




.56 


OH.... 


3 


0.48 


.33 


TB.... 


3 


0.48 


.33 


UD.... 


3 


0.48 


.33 


IF— 


10 




.65 


PH.... 


3 


0.48 


.33 


UB..„ 


3 


0.48 


.33 


HD.... 


2 


0.30 


.25 


NF— 


9 


0.95 


.53 


RH..._ 


3 


o.4a 


.33 


IB.... 


2 


0.30 


.25 


CD.... 


1 


0.00 


.13 


DF— 


8 


0.90 


.51 


AH.... 


2 


0.30 


.25 


NB 


2 


0.30 


.25 


FD_... 


1 


0.00 


.13 


TF— 


7 


0.85 


.48 


DH.... 


2 


0.30 


.25 


RB 


2 


0.30 


.25 


GD 


1 


0.00 


.13 


RF 


6 


0.78 


.45 


LH.... 


1 


0.00 


.13 


YB 


2 


0.30 


.25 


MD 


1 


0.00 


.13 


HF 


5 


39 


.42 


MH.... 


1 


0.00 


.13 


HB..._ 


1 


0.00 


.13 


PD 


1 


0.00 


.13 


AF 


4 


IB 


.'38 


XH— 


1 


O.OOi 


.13 


PB 


1 


0.00 


.13 


XD.__. 


1 


0.00 


.13 


LF 


3 


m 


.33 


YH.... 


1 


0.00 


.13 



2-22 

RESTRICTED 

















REF ID: A5 68 95 




Table 9-A, Contd . — The 428 different digraphs of Table 6-A, arranged first alphabetically accord- 
ing to their final letters and then according to their absolute frequencies, accompanied by the 
logarithms of their assigned probabilities 













REF ID : A56895 



REDTRIOTED 



Table 9-A, Concluded . — The b 28 different digraphs of Table 6-A, arranged first alphabetically, 
according to their final letters and then according to their absolute frequencies, accompanied by 
the logarithms of their assigned probabilities 


















REF ID: A5 68 95 




Table 9-B. — The 18 digraphs composing 25% of the 5,000 digraphs of Table 6-A, accompanied by 
the logarithms of their assigned probabilities, arranged alphabetically according to their final letters 



(1) AND ACCORDING TO THEIR INITIAL (2) AND ACCORDING TO THEIR ABSOLUTE 
LETTERS FREQUENCIES 



F 


L»(F) 


BBEM 1 


F 


Lio(F) 


WISH 

Kin 


F 


Lio(F) 


Kw 


F 


L»(F) 


Lac 

(2F) 


ED 


60 


1.78 


.88 


IN.... 


75 


1.88 


.92 


ED.... 


60 


1.78 


.88 


IN.... 


75 


1.88 


.92 


ND.... 


52 


1.72 


.85 


ON.... 


77 


1.89 


.92 


ND-. 


52 


1.72 


.85 


AN..~ 


64 


1.81 


.89 


NE 


67 


1.76 


.87 


TO.... 


50 


1.70 


.84 


RE.... 


98 


1.99 


.96 


TO.... 


60 


1.70 


.84 


RE.... 


98 


1.99 


.96 




87 


1.94 


.94 


TE 


71 


1.85 


.91 




87 


1.94 


.94 


SE_... 


49 


1.69 


.84 


ER.... 


NE.... 


57 


1.76 


.87 


ER.... 


TE.... 


71 


1.85 


.91 


OR.... 


64 


1.81 


.89 


VE.... 


57 


1.76 


.87 


OR.... 


64 


1.81 


. 89 


VE.... 


57 


1.76 


.87 




54 




.86 


SE.... 


49 


1.69 


.84 






1.73 


.86 










ES.... 


1.73 






ES 


54 


TH.... 


78 


1.89 


.92 


NT.... 


82 


1.91 


.93 


TH 


78 


1.89 


.92 


NT 


82 


1.91 


.93 










ST.... 


63 


1.80 


.88 










ST 


63 


1.80 


.88 


AN.... 


64 


1.81 


.89 


1 , 


249 






EN 


111 


2.05 


.99 


1 , 


249 






EN.... 


111 


2.05 


.99 










ON 


77 


1.89 


.92 











Table 9-C . — The 68 digraphs composing 50% of the 5,000 digraphs of Table 6-A, accompanied by 
the logarithms of their assigned probabilities, arranged alphabetically according to their final letters 



























RESTRICTED 



REF ID: A5 68 95 



Table 9-C, Concluded . — The 53 digraphs composing 50% of the 5,000 digraphs of Table 6-A, 
accompanied by the logarithms of their assigned probabilities, arranged alphabetically according to 
their final letters 



(2) AND ACCORDING TO THEIR ABSOLUTE FREQUENCIES 



F 


Ino(F) 


mym 


msm 


L»(F) 


mmm 


BMlIl 


L«(F) 


WMffm 


F 


LioOF) 


Lim 

m 


RA. 


39 


1.59 


.80 


EE 


42 




.81 


en..„: 


111 


2.05 


.99 


ES..„ 


54 


Ml 


.86 


MA 


86 


1.66 


.78 


LE 


37 


1.57 


.79 


ON.... 


77 


1.89 


.92 


AS 


41 




.80 


EA 


35 


1.54 


.78 


DE 


33 


1.52 


.77 


IN 


75 


1.88 


.92 


IS.... 


35 


■Wfrl 


.78 


DA 


32 


1.51 


.76 


CE 


32 


1.51 


.76 


AN.... 


64 


1.81 


.89 


RS.... 


31 


1.49 


.75 


LA.... 


28 


1.45 


.74 






i 




















TA.»„ 


28 


1.45 


.74 


TH 


78 


1.89 


.92 


TO.... 


60 


1.70 


.84 


NT.... 
ST 


82 

63 


1.91 

1.80 


.93 

.88 


EC 


32 


1.61 


.76 


TI 


45 


1.65 


.82 


CO.... 


41 


1.61 


.80 


AT 


47 


1.67 


.83 










10 .... 


41 


1.61 


.80 


RT.... 


42 


1.62 


.81 


ED.... 


60 


1.78 


.88 


FI.... 


39 


1.59 


.80 


FO.... 


40 


1.60 


.80 


ET.... 


37 


1.57 


.79 


ND 


52 


1.72 


.85 


SI.... 


34 


1.53 


.77 


RO.... 


28 


1.45 


.74 


HT 


28 


1.45 


.74 




HI.... 


33 


1.52 


.77 
















RE 


98 


1.99 


.96 


NI 


30 


1.48 


.75 










OU 


37 


1.57 


.79 


TE 


71 


1.85 


.91 


RI 


30 


1.48 


.75 


ER.... 


87 


1.94 


.94 


TW 


36 


1.56 


.78 


NE.... 


57 


1.76 


.87 










OR.... 


64 


1.81 


.89 










VE.... 


57 


1.76 


.87 


AL 


32 


1.51 


.76 


AR 


44 


1.64 


.82 


TY.... 


41 


1.61 


.80 


SE 


49 


1.69 


.84 


EL.... 


29 


1.46 


.74 


UR 


31 


1.49 


.75 


2,495 







Table 9-D. — The 122 digraphs composing 75% of the 5,000 digraphs of Table 6-A, accompanied by 
the logarithms of their assigned probabilities, arranged alphabetically according to their final letters 
(1) AND ACCORDING TO THEIR INITIAL LETTERS 



F 


L»(F) 




F 


Li*(F) 


HPSH 

BH 


F 


Lio(F) 


mm 


jasmin: 


L»(F) 


Lim 

(2F) 


CA 20 

DA.... 32 

EA 35 

HA.... 20 
LA.... 28 
MA.... 36 

NA 26 

PA 14 

RA.... 39 
SA.... 24 
TA.... 28 

AC. ... 14 

EC 32 

IC.... 22 
NC.... 19 

AD. ... 27 
ED.... 60 


1.30 

1.61 

1.54 

1.30 

1.45 

1.56 

1.41 

1.15 

1.59 

1.38 

1.45 

1.15 

1.51 

1.34 

1.28 

1.43 

1.78 


.67 

.76 

.78 

.67 

.74 

.78 

.72 

.61 

.80 

.71 

.74 

.61 

.76 

.69 

.67 

.73 

.88 


ND 52 

RD 17 

BE.... 18 
CE.... 32 
DE.... 33 
EE.... 42 
GE.... 14 
HE.... 20 
IE.... 13 
LE.... 37 
ME.... 26 
NE.... 57 
PE.... 23 
RE.... 98 
SE.... 49 
TE.... 71 
VE.... 57 
WE 22 


1.72 

1.23 

1.26 

1.51 

1.52 
1.62 
1.15 
1.30 
1.11 
1.57 
1.41 
1.76 
1.36 
1.99 
1.69 
1.85 
1.76 
1.34 


.85 

.64 

.66 

.76 

.77 

.81 

.61 

.67 

.59 

.79 

.72 

.87 

.70 

.96 

.84 

.91 

.87 

.69 


EF 18 

OF 25 

IG 19 

NG 27 

CH — 14 

GH 20 

SH — 26 
TH 78 

1 

AI 17 

DI 27 

El 27 

FI 89 

HI 33 

LI 20 

NI 30 

RI 30 


1.26 

1.40 

1.28 

1.43 

1.15 

1.30 

1.41 
1.89 

1.23 

1.43 

1.43 

1.59 

1.52 

1.30 

1.48 

1.48 


.66 

.72- 

.67 

.73 

.61 

.67 

.72 

.92 

.64 

.73 

.73 

.80 

.77 

.67 

.75 

.75 


SI__ 34 
TI.... 45 

AL. ... 32 

EL. '... 29 

IL 23 

LL.._. 27 

OL. .._ 19 

AM. ... 14 

EM. ... 14 

OM. ... 25 

AN. ... 64 

EN. -111 
IN.... 75 

ON. ... 77 

UN 21 


1.53 

1.65 

1.51 

1.46 

1.36 

1.43 

1.28 

1.15 

1.15 

1.40 

1.81 

2.05 

1.88 

1.89 

1.32 


.77 

.82 

.76 

.74 

.70 

.73 

.67 

.61 

.61 

.72 

.89 

.99 

.92 

.92 

.68 



2-26 



RESTRICTE D 




























REF ID: A56895 



Table 9-D, Could.— The 122 digraphs composing 75% of the 5,000 digraphs of Table 6-A, ac- 
companied by the logarithms of their assigned probabilities, arranged alphabetically according to 
their final letters 

(1) AND ACCORDING TO THEIR INITIAL LETTERS— Concluded 



Lu(F) 



41 l. 
16 1. 

40 1. 
20 1 . 

41 1. 
13 1. 
18 1. 
17 1. 
28 1. 
16 1. 
50 1. 
19 1. 



61 .80 
20 .63 
60 .80 
30 .67 
61 .80 
11 .59 
26 .66 
23 .64 
45 .74 
18 .62 
70 .84 
28 .67 



20 1.30 .67 
25 1.40 .72 



44 1.64 .82 
87 1.94 .94 
17 1.23 .64 

1.. .. 27 1.43 .73 

64 1.81 .89 

1.. .. 18 1.26 .66 

17 1.23 .64 
1.... 31 1.49 .75 

5 41 1.61 .80 

3 13 1.11 .59 

3 64 1.73 .86 

3 35 1.54 .78 

3 24 1.38 .71 

3 — 14 1.15 .61 




31 1.49 .75 
19 1.28 .67 
19 1.28 .67 



.67 .83 
,15 .61 
.18 .62 
.57 .79 
.45 .74 
.43 .73 
.91 .93 
.28 .67 
.62 .81 
,80 .88 



TT 19 

YT 15 

AU 13 

OU.„. 37 
QU 15 

EV 20 

IV.... 25 

TW 36 

IX.... 15 

TY 41 

3,745 




1.11 .59 
1.57 .79 
1.18 .62 

1.30 .67 
1.40 .72 

1.56 .78 

1.18 .62 

1.61 .80 




(2) AND ACCORDING TO THEIR ABSOLUTE FREQUENCIES 



Lu(F) 



.99 .96 
.85 .91 
.76 .87 
.76 .87 
,69 .84 
.62 .81 
.57 .79 
.52 .77 
.61 .76 
.41 .72 
.36 .70 
.34 .69 
.30 .67 
.26 .66 
.15 .61 
.11 .59 



25 1.40 1 .72 
18 1.26 




|HQ 


Li 0 (F) 


■luM 


F 


Lio(F) 




TH... 


78 


1.89 


.92 


OM 


25 


1.40 


.72 


SH... 


26 


1.41 


.72 


AM.... 


14 


1.15 


.61 


GH... 


20 


1.30 


.67 


EM.... 


14 


1.15 


.61 


CH... 


14 


1.16 


.61 


















EN 


111 


2.05 


.99 


TI_. 

FI... 

SI... 

HI... 


45 

39 

34 

33 


1. 65 
1.59 
1.53 
1.52 


.82 

.80 

.77 

.77 


ON.... 

IN.... 

AN.... 

UN.... 


77 

75 

64 

21 


1.89 

1.88 

1.81 

1.32 


.92 

.92 

.89 

.68 


NI... 

RI 

DI 

El 

LI_. 

AI... 


30 
30 
27 
. 27 
. 20 
. 17 


1.48 

1.48 

1.43 

1.43 

1.30, 

1.23 


.75 

.75 

.73 

.73 

.67 

.64 


TO.... 

CO.... 

10 .... 

FO._._ 

RO_._. 

HO.... 


60 

41 

41 

40 

28 

20 


1.70 

1.61 

1.61 

1.60 

1.45 

1.30 


.84 

.80 

.80 

.80 

.74 

.67 










WO.... 


19 


1.28 


.67 


AL... 


. 32 


1.51 


.76 


NO.... 


18 


1.26 


.66 


EL... 


. 29 


1.46 


.74 


PO.... 


17 


1.23 


. 64 


LL... 


. 27 


1.43 


.73 


DO.... 


16 


1.20 


.63 


IL._. 


. 23 


1.36 


.70 


SO.... 


16 


1.18 


.62 


OL... 


. 19 


1.28 


.67 


LO 


13 


1.11 


.59 



NG 27 1.43 .73 

IG 19 1.28 .67 




























RESTRICTED 



REF ID : A56895 



Table 9-D, Concluded . — The 122 digraphs composing 75% of the 5,000 digraphs of Table 6-A, 
accompanied by the logarithms of their assigned probabilities, arranged alphabetically according to 
their final letters 

(2) AND ACCORDING TO THEIR ABSOLUTE FREQUENCIES -Concluded 



F 


LioCF) 


Lm 

(2F) 


F 


Lio(F) 


Liii 

(2F) 


F 


Lta(F) 


1*4 • 
(2F) 


F 


LioCF) 


1*4 

(2F) 


OP.„„ 


25 


1.40 


.72 


ES.... 


54 


1.73 


.86 


NT.... 


82 


1.91 


.93 


ou.... 


37 


m 


.79 


EP 


20 


1.30 


.67 


AS.... 


41 


1.61 


.80 


ST.... 


63 




.88 


QU.... 


15 




.62 










IS.... 


35 


1.64 


.78 


AT.... 


47 


1.67 


.83 


AU 


13 


ESQ 


.59 










RS 


31 


1.49 


.76 


RT 


42 


1.62 


.81 


IV.... 
EV 


25 

20 


1.40 

1.30 


.72 

.67 


ER 


87 


1.94 


.94 


NS.... 


24 


1.38 


.71 


ET 


37 


1.67 


.79 


OR 


64 


1.81 


.89 


SS.... 


19 


1.28 


.67 


HT.... 


28 


1.45 


.74 


AR 


44 


1.64 


.82 


TS.... 


19 


1.28 


.67 


IT.... 


27 


1.43 


.73 


TW 


36 


1.56 


.78 


UR 


31 


1.49 


.75 


OS.... 


14 


1.15 


.61 


OT 


19 


1.28 


.67 


IX 


15 


1.18 


.62 


IR 


27 


1.43 


.78 


DS.... 


13 


1.11 


.59 


TT 


19 


1.28 


.67 


PR.... 


18 


1.26 


. 66 










DT 


15 


1.18 


.62 


TY 


41 


1.61 


.80 


HR.... 


17 


1.23 


.64 










YT.... 


15 


1.18 


.62 


3.745 






so 

i 

■ 

■ 


17 


1.23 


.64 










CT 


14 


1.15 


.61 








i 



Table 9-E . — All the 128 different digraphs of Table 6-A, arranged alphabetically first according to 
their final letters and then according to their initial letters 

(SEE TABLE 6-A.— READ DOWN THE COLUMNS) 



Table 10-A . — The 56 trigraphs appearing 100 or more times in the 50,000 letters of Governmental 
plain-text telegrams, arranged according to their absolute frequencies, accompanied by the loga- 
rithms of their assigned probabilities 



F 


LioCF) 


wmszmm 


F 


Lii(F) 


(2F) 


F 


Lu(F) 


Inn 

(2P) 


ENT 


569 


2.76 


.99 


TOP 


.... 174 


2.24 


.82 


EIG 


_.. 135 


rm 


.79 


ION 


260 


2.41 


.88 


NTH 


.... 171 


2.23 


.82 


FIV 


.... 135 


2.13 


.79 


AND 


228 


2.36 


.86 


TWE. 


wSFf i 


2.23 


.82 


MEN 


.... 131 


2.12 


.78 


ING 


226 


2.35 


.86 


TWO 




2.21 


.81 


SEV 


.... 131 


2.12 


.78 


IVE 


225 


2.35 


.86 


ATI 


iSEi 


2.20 


.81 


ERS 


.... 126 


Ptlil 


.78 


TTO 


221 


2.34 


.85 


THR 


_.. 158 


2.20 


.81 


UNO 


wmm 


2.10 


.78 


FOR 


218 


2.34 


.86 


NTY 




2.20 


.81 


NET 


.... 118 


rm 


.77 


nilR 


211 


2.32 


.85 


HRE 


mm 


2.18 


.80 


PER. 


.... 115 


2.06 


.76 


THI 


211 


2.32 


.85 


WEN.. .. 


n£|&] 


2.18 


.80 


STA. 


.... 115 




.76 


ONE 


210 


2.32 


.85 


FOU 


.... 152 


2.18 


.80 


TER 


.... 1 Jr, 


2.06 


.76 


NIN 


207 


2.32 


.85 


ORT 


.... 146 


2.16 


.80 


EQU 


.... Ill 




.76 


STO 


202 


2.31 


.84 


REE 


.... 146 


2.16 


.80 


RED 


.... 113 




.76 


EEN 


196 


2.29 


.84 


SIX. 


.... 146 


2.16 


.80 


TED 


.... 112 




.76 


ght 


196 


2.29 


.84 


ASH...... 


.... 143 


2.16 


.80 


ERI 


BE m 




.76 


INE 


192 


2.28 


.83 


DAS 


■El 


2.15 


.79 


HIR. 






.75 


VEN 


190 


2.28 


.83 


IGH. 


• 


2.15 


.79 


IRT 






.76 


EVE 


177 


2.25 


.82 


ERE 


.... 138 


2.14 


.79 


DER 






.74 


EST...,. 


176 


2.25 


.82 


COM 


.... 136 


2.13 


.79 


DRE...... 






.74 


TEE 


174 


2.24 


.82 


ATE 


.... 135 


2.13 


.79 






• 





2-28 



RESTRICTED 


































REF ID : A56895 



RESTRICTE D- 



Table 10~B. — The 56 trigraphs appearing 100 or more times in the 50,000 letters of Governmental 
plain-text telegrams, arranged first alphabetically according to their initial letters, and then 
according to their absolute frequencies, accompanied by the logarithms of their assigned probabilities 



p 


L»(F) 


Ian 

(2F) 


F 


Lm(F) 


Kl 

mml 


AND 


228 


2.36 


.86 


GHT 


196 


2.29 


.84 


ATI 




2.20 


.81 










ASH 


143 


2.16 


.80 


HRE 


153 


2.18 


.80 


ATE 


136 


2.13 


.79 


HIR 


106 


2.03 


.75 


COM 


136 


2.13 


.79 


TOM 


260 


2.41 


.88 










ING 


226 


2.35 


.86 


DAS 




2.15 


.79 


IVE 


225 


2.35 


.86 


DER 


101 


2.00 


.74 


INE 


192 


2.28 


.83 


DRE„ 


HiTil 


2.00 


.74 . 


TGH 


140 


2.15 


.79 










IRT 


105 


2.02 


.76 


ENT 


569 


2.76 


.99 










EEN 


196 


2.29 


.84 


MEN.. 


131 


2.12 


.78 


FIVE 


177 


2.25 


.82 










EST 


176 


2.25 


.82 


NIN 


207 


2.32 


.85 


ERE 


138 


2.14 


.79 


NTH 


171 


2.23 


.82 


EIG 


135 






NTY 


157 


2.20 


.81 


ERS 


126 


2.10 


.78 


NET 


118 


2.07 


.77 


EQU 


114 


2.06 


.76 










ERI 


109 


2.04 


.76 


OUR 


211 


2.32 


.85 










ONE 


210 


2.32 


.85 


FOR 


218 


2.34 


.85 


ORT 


146 


2.16 


.80 


FOU 


152 


2.18 


.80 










FIV 


136 


2.13 




PER 


115 


2.06 


.76 



Ln(F) 



Lilt 

(2F) 



REE- 

RED. 



TIO. 

THI. 

TEE- 



146 

113 



STO 202 

SIX 146 

SEV 131 

STA 115 



221 

211 

174 

174 

170 

163 



TOP 

TWE 

TWO 

THR.. 158 

TER 116 

TED___:__ 112 

UND 125 

VEN ,_1 190 

WEN_ 153 



2.16 

2.05 

2.31 
2.16 
2.12 

2.06 

2.34 

2.32 
2.24 
2.24 
2.23 
2.21 
2.20 
2.06 
2.05 

2.10 

2.28 

2.18 



.80 

.76 

.84 

.80 

.78 

.76 

.85 

.85 

.82 

.82 

.82 

.81 

.81 

.76 

.76 

.78 

.83 

.80 



Table 10-C . — The 56 trigraphs appearing 100 or more times in the 50,000 letters of Governmental 
plain-text telegrams, arranged first alphabetically according to their central letters, and then ac- 
cording to their absolute frequencies, accompanied by the logarithms of their assigned probabilities 



F 1 


LloCF) 


SIS 




DA S 


140 


2.15 


.79 


IGH 


140 


EEN 


196 


2.29 


.84 






VEN 


190 


2.28 


.83 






TEE 


174 


2.24 


.82 


THI 


211 


WEN 


153 


2. J8 


.80 


GHT 


196 


REE- 


146 


2.16 


.80 


THR 


168 


MEN 


131 


2.12 


.78 






SEV 


131 


2.12 


.78 






NET _ 


118 


2.07 


.77 


Tin 


221 


PER 


115 


2.06 


.76 


NTN 


207 


TER 


115 


2.06 


.76 


SIX 


146 


RED 


113 


2.05 


.76 


EIG 


135 


TED 


112 


2.05 


.76 


EIV 


135 


DER 


101 


2.00 


.74 


HTR 


106 















2-29 





KSv- 




Lm(F) 


wjm 




.79 


ENT 


569 


2.76 


.99 






AND 


228 


2.36 


.86 






ING 


226 


2.35 


.86 


2.32 


.85 


ONE 


210 


2.32 


.85 


2.29 


.84 


INE 


192 


2.28 


.83 


2.20 


.81 


UND 


125 


2.10 

■ 


.78 


2.34 


.85 










2.32 


.85 


ION 


260 


2.41 


.88 


2.16 


.80 


FOR 


218 


2.34 


.85 


2.13 


.79 


TOP 


174 


2.24 


.82 


2.13 


.79 


FOU 


152 


2.18 


.80 




.75 


COM 


136 


2.13 


.79 



RESTRICTED - 


























Tablb 10-C, Concluded . — The 66 trigraphs appearing 100 or more times in the 50,000 letters of 
Governmental plain-text telegram, arranged first alphabetically according to their central letters, 
and then according to their absolute frequencies, accompanied by the logarithms of their assigned 
probabilities 



F 


L»(F) 


1*4 

(2F) 


F 


Ln(F) 




(2F) 


F 


Lio(F) 


rxsr 

(2F) 


EQU.. 


.. 114 


2.06 


.76 


EST 


.... 176 


2.25 


.82 


OUR 


.... 211 


2.32 


.85 










ASH 


.... 143 


2.16 


.80 










HRE 


.. 158 


2.18 


.80 


















ORT 


.. 146 


2.16 


.80 


STO 


.... 202 


2.31 


.84 


IVE 


.... 225 


2.35 


.86 


ERE 


.. 188 


2.14 


.79 


NTH. 


.... 171 


2.28 


.82 


EVE 


.... 177 


2.25 


.82 


ERS 


.. 126 


2.10 


.78 


ATI. 


.... 160 


2.20 


.81 










ERI 


.. 109 


2.04 


.76 


NTY. 


.... 157 


2.20 


.81 










IRT 


.. 105 


2.02 


.75 


ATE. 


.... 135 


2.13 


.79 


TWE 


.... 170 


2.23 


.82 


DRE 


„ 100 


2.00 


.74 


STA...... 


.... 115 


2.06 


.76 


TWO 


.... 163 


2.21 


.81 



Table 10-D . — The 66 trigraphs appearing 100 or more times in the 50,000 letters of Governmental 
plain-text telegrams, arranged first alphabetically according to their final letters, and then according 
to their absolute frequencies, accompanied by the logarithms of their assigned probabilities 




RE3TIUCTE B 



























REF ID: A5 68 95 



RESTRICTED 



Table 11-A.- — The 5i tetragraphs appearing 50 or more times in the 50,000 letters of Governmental 
plan-text telegrams, arranged according to their absolute frequencies, accompanied by the logarithms 
of their assigned probabilities _____ 



F 


Lu(F) 


L»4 

(2F) 


F 


Lw<F) 

. 


mni 

mmmm 


F 


7MF) 


Wfrm 

B35l 


TION 


218 


2.34 


.99 


THIR 


.._ 104 


2.02 


.87 


ASHT 


64 


1.81 


.79 


EVEN 


168 


2.23 


.95 


EENT 


.... 102 


2.01 


.87 


HUND 


64 


1.81 


.79 


TEEN 


163 


2.21 


.94 


REQU.... 


.... 98 


1.99 


.86 


DRED 


63 




.79 


ENTY 


161 


2.21 


.94 


HIRT 


.... 97 


1.99 


.86 


RIOD 


63 




.79 


STOP 


154 


2.19 


.93 


COMM.... 


.... 93 


1.97 


.85 


IVED 


62 


1.79 


.78 


WENT 


153 


2.18 


.93 


QUES.... 


.... 87 


1.94 


.84 


ENTS 


62 




.78 


NINE 


153 


2.18 


.93 . 


UEST 


.... 87 


1.94 


.84 


FFIC 


62 


1.79 


.78 


TWEN 


152 


2.18 


.93 


EQUE.... 


.... 86 


1.93 


.84 


FROM 


59 


1.77 


.78 


THRE 


149 


2.17 


.93 


NDRE..-. 


.. 77 


1.89 


.82 


IRTY 


59 


1.77 


.78 


FOUR 


144 


2.16 


.92 


OMMA 


.... 71 


1.85 


.81 


RTEE 


59 


1.77 


.78 


IGHT 


140 


2.15 


.92 


LLAR 


.... 71 


1.85 


.81 


UNDR 


.59 


1.77 


.78 


FIVE 


186 


2.13 


.91 ! 


OLLA.... 


.... 70 


1.85 


.81 


NAUG 


56 


1.76 


.77 


HREE 


134 


2.18 


.91 


VENT.... 


.... 70 


1.85 


.81 


OURT 


56 


1.75 


.77 


DASH 


132 1 


2.12 


.91 


DOLL.... 


.... 68 


1.83 


.80 


UGHT 


56 


1.75 


.77 


EIGH 


132 


2.12 


.91 


LARS.... 


.... 68 


1.83 


.80 


STAT 


54 


1.7$ 


.76 


SEVE 


121 


2.08 


.89 


THIS.... 


.... 68 


1.83 


.80 


AUGH 


52 


1.72 


•i 6 


ENTH 


114 


2.06 


.89 


PERI.... 


67 


1.83 


.80 


CENT 


52 


1.72 


• 76 


MENT 


111 


2.05 


.88 


ERIO 


.._ 66 


1.82 


.80 


FICE 


50 


1.70 


.76 



Table 11-B. — The 5J f tetragraphs appearing BO or more times in the 50,000 letters of Governmental 
plain-text telegrams, arranged first alphabetically according to their initial letters, and then ac- 
cording to their absolute frequencies, accompanied by the logarithms of their assigned probabilities 



F 


Lio(F) 


Lz?< 

(2F) 


| 


Lio(F) 


m&mm 


! F 

1 


Lu(F) 


HS31 


ASHT.* 64 

AUGH 62 

COMM 93 

CENT 52 

DASH 132 

DOLL 68 

DRED 63 

EVEN 168 

ENTY 161 

EIGH 132 

ENTH 114 

EENT 102 

EQUE 86 

ERIO 66 

ENTS 62 

FOUR 144 

FIVE 136 

FFIC 62 

FROM 59 

FICE 50 


1.81 

1.72 

1.97 

1.72 

2.12 

1.83 

1.80 

2.23 

2.21 

2.12 

2.06 

2.01 

1.93 

1.82 

1.79 

2.16 

2.13 

1.79 

1.77 

1.70 


.79 

.76 

.85 

.76 

.91 

.80 

.79 

.95 * 

.94 

.91 

.89 j 
.87 | 

.84 
.80 

.78 1 

.92 

.91 

.78 

.78 

.75 • 


HREE 134 

HIRT 97 

1 HUND 64 

IGHT 140 

IVED 62 

IRTY 69 

LLAR 71 

LARS 68 

MENT 111 

NINE 163 

NDRE 77 

NAUG 56 

OMMA 71 

OLLA 70 

OURT 56 

PERI 67 

QUES 87 


2.13 

1.99 

1.81 

2.15 

1.79 

1.77 

1.85 

1.83 

2.06 

2.18 

1.89 

1.76 

1.85 

1.85 

1.75 

1.83 

1.94 


.91 

.86 

.79 

.92 

.78 

.78 

.81 

.80 

.88 

.93 

.82 

.77 

.81 

.81 

.77 

.80 

.84 


REQU 98 

RIOD 63 

RTEE 59 

STOP 154 

SEVE 121 

STAT 54 

TION 218 

TEEN 163 

TWEN 152 

THRE 149 

THIR 104 

THIS 68 

UEST 87 

UNDR 69 

UGHT 66 

VENT 70 

WENT 153 


'1.99 

1.80 

1.77 

2.19 

2.08 

1.73 

2.34 

2.21 

2.18 

2.17 
2.02 
1.83 

1.94 

1.77 

1.75 

1.85 

2.18 


.86 

.7:9 

.7,8 

.89 

.76 

.99 

.94 

.93 

.93 

.87 

.80 

.84 

.78 

.77 

.81 

.93 



2-31 



RESTRICTED 

















RESTRICTED 



REF ID: A5 68 95 



Table 11-C. — The 5k tctragraphs appearing 50 or more times in the 50,000 letters of Governmental 
plain-text telegrams, arranged first alphabetically according to their second letters, and then ac- 
cording to their absolute frequencies, accompanied by the logarithms of their assigned probabilities 



p 


L»(F) 


Lm 

<2F) 


P 


Lu(F) | 


mjsmm 


P 


Lm(F) 


HCST 

(ZF) 


DASH 132 

LARS 68 

NAUG 56 

NDRE 77 

TEEN 163 

WENT 153 

SEVE 121 

MENT 111 

EENT 102 

REQU 98 

UEST 87 

VENT 70 

PERI 67 

CENT 52 

FFIC 62 

IGHT 140 

UGHT 56 

THRE 149 

THIR 104 

THIS 68 


2.12 

1.83 

1.75 

1.89 

2.21 

2.18 

2.08 

2.05 

2.01 

1.99 

1.94 

1.85 

1.83 

1.72 

1.79 

2.15 

1.75 

2.17 

|2.02 

1.83 


.91 

.80 

.77 

.82 

.94 

.93 

.89 

.88 

.87 

.86 

.84 

.81 

.80 

.76 

.78 

.92 

.77 

.93 

.87 

.80 


TION 218 

NINE 153 

FIVE 136 

EIGH 132 

HIRT 97 

RIOD 63 

FICE 60 

LLAR 71 

OLLA 70 

OMMA 71 

ENTY 161 

ENTH 114 

ENTS.. „ 62 

UNDR 59 

FOUR 144 

COMM 93 

DOLL 68 

EQUE 86 


2.34 

2.18 

2.18 

2.12 

1.99 

1.80 

1.70 

1.85 

1.85 

1.85 

2.21 

2.06 

1.79 

1.77 

2.16 

1.97 

1.83 

1.93 


.99 

.93 

.91 

.91 

.86 

.79 

.75 

.81 

.81 

.81 

.94 

.89 

.78 

.78 

.92 

.85 

.80 

.84 


HREE 134 

ERIO 66 

DRED 63 

FROM 59 

IRTY..„1._ 59 

ASHT 64 

STOP 154 

RTEE 59 

STAT 54 

QUES 87 

HUND 64 

OURT 56 

AUGH. 62 

EVEN 168 

IVED 62 

TWEN 162 


2.13 

1.82 

1.80 

1.77 

1.77 

1.81 

2.19 

1.77 

1.78 

1.94 

1.81 

1.76 

1.72 

2.23 

1.79 

2.18 


.91 

.80 

.79 

.78 

.78 

.79 

.93 

.78 

.76 

.84 

.79 

.77 

.76 

.95 

.78 

.93 



Table 11-D. — The 5k tetragraphs appearing 50 or more times in the 50,000 letters of Governmental 
plain-text telegrams, arranged first alphabetically according to their third letters, and then according 
to their absolute frequencies, accompanied by the logarithms of their assigned probabilities 



P 


Lu(F) 


»*r?i 


LLAR 


71 


1.85 


.81 


STAT 


54 


1.73 


.76 


FICE 


50 


1.70 


.76 


UNDR 


59 


1.77 


00 


EVEN 


168 


2.23 


.95 


TEEN. 


163 


2.21 


.94 


TWEN 


152 


2.18 


.93 


HREE 


134 


2.13 


.91 


QUES 


87 


1.94 


.84 


DRED 


63 


1.80 


.79 


IVED 


62 


1.79 


.78 


RTEE 


59 


1.77 


.78 



P 


LiaCF) 


LiU4 

(2F) 


EIGH 


182 


2.12 


.91 


AUGH 


52 


1.72 


.76 


IGHT 


140 


2.15 


.92 


ASHT 


64 


1.81 


.79 


UGHT 


56 


1.75 


.77 


THIR 


104 


2.02 


.87 


THIS 


68 


1.83 


.80 


ERIO 


66 


1,82 


.80 


FFIC 


62 


1.79 


.78 



COMM 93 

OMMA 71 

WENT 153 

NINE 153 

MENT 111 

EENT 102 

VENT 70 

HUND 64 

CENT 52 

TION 218 

STOP 154 

RIOD 63 

FROM 59 



L»(F) 

1.97 

1.85 

2.18 

2.18 

2.05 

2.01 

1.85 

1.81 

1.72 

2.34 

2.19 

1.80 

1.77 



(ZF) 

.85 

.81 

.93 

.93 

.88 

.87 

.81 

.79 

.76 

.99 

.93 

.79 

.78 



OLLA 

DOLL. 



70 1.85 .81 
68 1.83 .80 























REF ID: A5 68 95 



Table 11-D, Concluded . — The 5U tetragraphs appearing 50 or more times in the 50,000 letters of 
Governmental plain-text telegrams, arranged first alphabetically according to their third letters, and 
then according to their absolute frequencies, accompanied by the logarithms of their assigned 
probabilities 



F 


Lw(F) 


K« 1 


F 


Llfl(F) 


Dm 

(2F) 


REQU 


..... 98 


1.99 


00 

Oi 


DASH 


132 


2.12 


.91 










UEST 


87 


1.94 


.84 


THRE_„ 


.... 149 


2.17 


.93 










HIRT... 


.._ 97 


1.99 


.86 










NDRE... 


.... 77 


1.89 


.82 


ENTY 


161 


2.21 


.94 


LARS... 


68 


1.83 


.80 


ENTH 


114 


2.06 


.89 


PERI... 


.... 67 


1.83 


.80 


ENTS 


62 


1.79 


.78 


OURT... 


..... 56 


1.75 


.77 


IRTY 


59 


1.77 


.78 



FOUR 144 2.16 .92 

EQUE 86 1.93 .84 

NAUG 56 1.76 .77 



FIVE 135 2.13 .91 

SEVE 121 2.08 .89 



Table 11-E. — The 5$. tetragraphs appearing 50 or more times in the 50,000 letters of Governmental 
plain-text telegrams, arranged first alphabetically according to their final letters, and then according 
to their absolute frequencies, accompanied by the logarithms of their assigned probabilities 



P Lu(F) 



OMMA.. 

OLLA.. 




FFIC 62 1.79 .78 

HUND 64 1.81 .79 

DRED 63 1.80 .79 

RIOD 63 1.80 .79 

IVED 62 1.79 .78 



NINE 153 

THRE 149 

FIVE 135 

HREE 134 

SEVE 121 

EQUE 86 

NDRE 77 

RTEE 59 

FICE 50 



2.18 .93 
2'. 17 .93 
2.13 .91 
2.13 .91 
2.08 .89 
1.93 .84 
1.89 .82 
1.77 .78 
1.70 .75 



DASH 132 2.12 .91 

EIGH 132 2.12 .91 

ENTH 114 2.06 .89 

AUGH 52 1.72 .76 



NAUG. 



66 1.75 .77 



PERI 67 1.83 .80 

DOLL 68 1.83 .80 

COMM 93 1.97 .85 

FROM 59 1.77 .78 

TION 218 2.34 .99 

EVEN 168 2.23 .95 

TEEN 163 2.21 .94 

TWEN 152 2.18 .93 

ERIO 66 1.82 .80 

STOP 154 2.19 .93 

FOUR 144 2.16 .92 

THIR 104 2.02 .87 

LLAR 71 1.85 .81 

UNDR i 59 1.77 .78 



P L»(F) 



QUES 87 1.94 .84 

THIS 68 1.83 .80 

LARS 68 1.83 .80 

ENTS 62 1.79 .78 

WENT 153 2.18 .93 

IGHT 140 2.15 .92 

MENT 111 2.05 .88 

EENT 102 2.01 .87 

HIRT 97 1.99 .86 

UEST 87 1.94 .84 

VENT 70 1.85 .81 

ASHT 64 1.81 .79 

OURT 56 1.76 .77 

UGHT 56 1.75 .77 

STAT 54 1.73 .76 

CENT 52 1.72 .76 

REQU 98 1.99 .86 

ENTY 161 2.21 .94 

IRTY 59 1.77 .78 


















RESTRICTED 



REF ID: A56895 



Table 12. — Average length of words and messages 



Number of 
letters in 
word 

X 


Number of 
times K-letter 
word appears 


Number of 
letters 


i 


378 


378 


2 


973 


1,946 


3 


1,307 


3,921 


4 


1,635 


6,540 


5 


1,410 


7,050 


6 


1,143 


6,858 


7 


1,009 


7,063 


8 


717 


5,736 


9 


476 


4,284 


10 


274 


2,740 


11 


161 


1,771 


12 


86 


1,032 


13 


23 


299 


14 


23 


322 


15 


4 


60 




9,619 


50,000 



(1 ) Average length of words 5.2 letters. 

(2) Average length of messages. 217 letters. 

(3) Modal (most frequent) length 105-114 letters. 



(4) It is extremely unusual to find five consecutive letters without at least one vowel. 
(6) The average number of letters between vowels is two. 



2-34 



nEDTRICTBfr 




REF ID: A56895 

RESTRICTED 



Table 13. — Checkerboard individual frequencies 1 

(Bnsotl on a count of 5,000 digraphs! 

Pi Cx 



A 


B 


C 


D 


E 


244 


225 


375 


394 


197 


F 


G 


H 


I J 


K 


125 


98 


193 


271 


95 


L 


M 


N 


0 


P 


229 


199 


188 


350 


251 


Q 


R 


S 


T 


U 


148 


162 


268 


427 


295 


V 


W 


X 


Y 


Z 


42 


12 


34 


91 


97 


212 


317 


368 


308 


249 


A 


B 


C 


D 


E 


120 


108 


216 


256 


85 


F 


G 


H 


I J 


K 


216 


140 


152 


435 


269 


L 


M 


N 


0 


P 


206 


121 


306 


364 


284 


Q 


R 


S 


T 


U 


38 


29 


21 


147 


43 


V 


W 


X 


Y 


Z 



C, P 2 



1 The numbers in the Ci C 2 squares represent the frequency of the individual components of the cipher digraph 
used to replace a given Pi P 2 digraph in accordance with a digraphic checkerboard system where Pi and P* are the 
plain-text squares. 




2-35 






Fibst Letter 



REF ID: A5 68 95 



RESTRICTED 



Table 14. — Relative logarithmic values of frequencies of English digraphs 

[Based on a count of 5,000 digraphs. To obtain logarithm to base 10 (Log 10) divide by 100] 

Second Letter 

ABCDE FGHIJKLMNOPQRSTUVWXYZ 




*In computations, assign a value of -100 as the log for these digraphs. These combinations do not usually 
occur in 5,000 digraphs. Do not assign “0” to these combinations as that is the logarithmic value for a fre- 
quency of one, and these combinations have a frequency of less than one. 













REF ID: A5 68 95 




Table 15. — Relative logarithmic values (. Log, 222) of frequencies of English digraphs ' 



[Based on a count of 6,000 digraphs] 

Second Letter 

ABCDEFGHIJKLMNOPQRSTUVWXYZ 




* See pages 11-12 for details. 



2-37 



1197 









I* L+r. 



F.,n npr? th tt^d * * 'Etk'f f'D : A56895 

SPECIAL-PURPOSE DATA 

Table 16-A . — Frequency distribution of digraphs, based on 6h f 365 
letters of decrypted U. S. Government messages in -which Z was used as 
a word-separator and X was used for both Xp and Zp. 

X* L+*j 

ABCDBFOHXJKLMHOPQBSTUVWXTZ 







*VV* k*' ** w** u* ^ 



In the text which gave rise to this and the following two tables, the 
frequently-used punctuation signs "comma" and "period" were abbreviated 
as CMA and PD, respectively, and the procedure term "repeat" was abbre- 
viated as RET; thus, the digraphs CM, FD, PT, and RP, which usually do 
not occur frequently (see Table 6- A), are of relatively high frequency 
here . 



2-38 

























REF ID: A5 68 95 



7 



~ REGTRICTED 

Tabic l6-B ..—Frequency distribution of digraphs, based on the 
text used for Table l6~A, from which the Z word- separator has been 
omitted (total: 53 >866 letters)* 

a-* Ltv. 





A 


B 


C 


D 


E 


F 


G 


II 


X 


J 


K 


L 


M 


n 


0 


p 


Q 


R 


S 


T 


u 


V 


w 


X 


Y 


Z 


A 




ns 


no 


141 


to 


134 


III 


24 


131 


it 


SI 


217 


144 


t31 


SS 


147 


3 


<S7 


411 


31S 


4S 


S8 


to 


zx 


47 




B 




»t 


1 


Z 


m 


S 




1 


43 


XZ 




111 


4 


13 


42 


2 




42 


17 


IX 


IS 


2 


3 


X 


4o 




C 




g 


El 


H 


043 


m 


gj 


3 


DO 




B 




313 


II 


S3 


□ 


B 


B 


B 


ISO 


47 


1 


4 


B 


B 


■ 


D 


3 


a 


[2 


n 


307 


s 




i 




7 


a 


9 


xz 


XX 


ISI 


17 


14 


It! 


118 


9 


B 


Q 


m 


B 


B 


■ 


E 


3 


□ 


3ft 


tf| 


41o 


m 


B 






21 


B 


B 


H 


8SS 


181 




m 


131 




S3 


B 


BS 


EQ 


134 


It 




F 


4o 


□ 


B 


2S 


|Ol 


Q 


D 




300 


■3 


i 


31 


2S 


10 


91 


Q 


B 


m 


B 


□ 


9 


9 


1 


3 


7 




> 

G 


loz 


31 




®1 


244 


n 


fl 




37 


f 


2 


IX 


10 


tl 


3 


1 


D 


B 


S3 


38 


fl 


5 


3 


B 


B 




H 


2?0 


8 


Q 


fl 


gg 


S4 


13 


31 


no 


B 


o 


B! 


fl 


34 


bj: 


B 


B 


231 


B! 


yg 


IS 


X 


□ 


□ 


B 




I 


84 


□ 


PH 


B 


B 


ra 


330 


8 


S’ 


B 


B 


BS 


B 


70S 


2o2 




B 


its 


fli 


fl 


a 


El 


B 


RSI 


B 


■ 


J 


n 


■ 


a 


B 


B 


Q 




1 


21 


zo 




□ 


fl 


S 


B 


B 


g 


fl 


B 


B 


7 


z 


9 


g 


B 


g 


K 


si 


□ 


□ 


B 


m 


B 


□ 


B 


□ 


* 


B 


□ 


a 


13 


B 


D 


9 


4 


□ 


s 


B 


D 


D 


5 


B 


B 


. L 


m 


a 


fl 


g 


333 


fl 


B 


B 


S3 


7 


B 


BS 


Z4 


48 


BS 


B 


i 


zt 


B 


i* 


B 


B 


14 


• 


72 


g 


£ 

J M 


SIS 


fl 


a 


B 


204 


9 


9 


B 


B 


4 


B 


D 


47 


17 


43 


B 


B 


Z4 


B 


B 


B 


z 


m 


B 


84 


B 


•ft 

“ H 




*» 


Z$6 




718 


•31 


0 


B 


243 


4 


ii 


B 


47 


84 


at 


B 


B 


Q 


Bj 


2 


B 


23 


□ 


B 


17 


g 


0 


a 


B 


Q 


iss 


43 


tit. 


72 


B 


9 


IX 


27 


I7Z 


ZSl 


Ho 


ii 


ua 


B 


as 


m 


2lt 


til 


SI 


m 


E9 


17 


S 


P 


EQj 


D 


B 


£21 


170 


S’ 


3 




fg 


t 




74 


44 

. . 


II 


•So 


HI 


X 


m 


B 


36S 


It 


z 


a 


B 


5“ 




Q 


i 


D 


3 


■ 


7 


z 




4 


s 




1 


1 


5“ 


II 


8 


Z 


1 


m 


B 


z 


us 




X 


1 






R 


S3 




131 


*44 


BS 


H 


B 


it 


207 


n 


to 


41 


1 4Z 


SI 


4X1 


X41 


fl 


S3 


a 


E 


fl 


9 


21 


3o 


7+ 




S 


IBS 


R] 


B9 


a 


314 


Itl 


ss 


4S3 


9 


■ 


11 


zsr 


4c 


34 


173 


in 


B 


B 


BH 


SB 


El 


m 


3t 


z 


43 




T 


277 


30 


U7 


70 


too 


HI 


21 


sn 


2 


Q 


14 


t3 


B 


\m 


443 


HS 


B 


m 


E3 


a 




B 


2l 


Xo 


SI 




U 


48 


B 


m 


9 


m 


7 


41 


c 


B 


| 


+ 


S4 


B 


9 


3S 


m 


B 


1st 


E 




B 


B 




4 


1 




V 


41 




m 


□ 




7 


1 


i 


B 


B 


2 


4 


B 


Q 


2| 


a 


B 


□ 


B 


D 


B 


B 




1 


7 




W 


113 


D 


D 


a 


B 


Z 


B 


B 


IQ 


□ 


fl 


B 


B 


B 


ffi 


B 


B 


B 


B 


□ 


B 


B 




IS 


t 




X 


liL 


IS 


m 


B 






B 


D 


B 


□ 


E 


B 


B 


B 


o 


B 


B 


B 


B 


H 


□ 


B 




St 


3 




Y 


fl 


B 


m 


B 


Q 


B 


B 


□ 


B 


a 


B 


D 


RJ 


B 


B 


B 


B 


B 


B 


5J 


B 


n 


IQ 


I 


IS 




Z 








r 


L 




r 


d 


LI 


L 
















L 


r. 










n 










a*, 


^ / 


w 




** 


«* 








k 4 

<» K 


** 


& 








** 


4*. 


,*' v 








o' 






2-39 


















REOTRICTEB 



REF ID: A5 68 95 



Table l6-C . — The 53 digraphs from Table 6- A -which comprise 50$ of 
the total, arranged according to frequencies reduced to a "base of 5/000 
digraphs, shown with the corresponding frequencies of the same digraphs 
from Table l6-B (also reduced to a base of 5/000) .1 



Dig, 


6-A 


16-B 


Dig, 


6— A 


16-B 


EN 


111 


79 


FO 


4o 


54 


RE 


98 


94 


FI 


39 


35 


ER 


87 


86 


RA 


39 


28 


NT 


82 


33 


ET 


37 


34 


TH 


• 78 


55 


LE 


37 


31 


ON 


77 


84 


OU 


37 


39 


nr 


75 


65 


MA 


36 


55 


TE 


71 


36 


TW 


36 


31 


AN 


64 


4l 


EA 


35 


28 


OR 


64 


44 


IS 


35 


28 


ST 


6 3 


36 


SI 


34 


34 


ED 


60 


45 


DE 


33 


29, 


NE 


57 


69 


HI 


33 


20 1 


VE 


57 


46 


AL 


32 


21 1 


ES 


54 


44 


CE 


32 


24 


ND 


52 


31 


DA 


32 


4l 


TO 


50 


43 


EC 


32 


36 


SE 


49 


37 


RS 


31 


25 


AT 


47 


37 


UR 


31 


42 


TI 


45 


29 


HI 


30 


24 


AR 


44 


6l 


RI 


30 


191 


EE 


42 


64 


EL 


29 


19 1 


RT 


.42 


24 


HT 


28 


29, 


AS 


4i 


57 


LA 


28 


18 1 


CO 


4i 


39, 


RO 


28 


59 


10 


4i 




TA 


28 


26 


TY 


4i 


5 1 









With the exception of AL, EL, HI, 10, LA, RI, TY, the digraphs of 
this table are all from among the 65 digraphs from Table 16-B which 
comprise 50$ of the total. 



P-4o 



ifr EDTRICTED 



REF ID: A5 68 95 




APPENDICES 




\ 



& 



A 



A 






& 



£ 



A 

A 7T. 



jtt " 



JSl 4 ,_ * 
jf 









A 



m ' 



* 



A- 

A 






A 



A 



A 



Jilt 



A 



A 



REF ID : A56895 



RESTRICTED 



APPENDIX 3 

WORD AND PATTERN LISTS - ENGLISH i 

I' 

Section Pages 

A. List of words used in military text arranged alphabeti- 
cally according to word length 2-10 

B» List of words used in military text arranged in rhyming 

order according to word length 11-19 

C . List of words used in military text arranged alphabeti- 
cally according to word pattern, 20-37 

D* Digraphic idiomorphs: general 38-39 

E. Digraphic idiomorphs: Playfair.... 40-42 

F. Digraphic idiomorphs: four-square........ 43-4-5 



RESTRICTED 



KEF ID : A56895 - 

RESTRICTED : 



A. LIST OF WORDS USED IN MILITARY TEXT ARRANGED ALPHABETICALLY 

ACCORDING TO WORD LENGTH 



AM 


BY 


EM 


TWO LETTER WORDS 
IN. • 


MM 


OK 


TO 


AN 


CO 


GO 


IS 


MP ’ 


ON 


US 


AS 


CP 


HE 


IT 


MY 


OR 


WD 


AT 


CQ 


HQ 


MC 


NO 


• QM 


WE 


BE 


DO 


IF 


; ME 


OF 


SO 


WO 


BN 

ACT 


BID 


DUN 


THREE LETTER WORDS 

HAS MIX 


PVT 


TEN 


ADD 


BIG 


EAT 


HER 


NAN 


QMC 


THE 


ADJ 


BOX 


END 


HIM 


NET 


RED 


TIN 


AGE 


BUT 


EYE 


HIS 


NEW 


RID 1 


' TON 


AGO 


BUY 


FAR 


HOW 


NOT 


ROB 


TOO 


AID 


CAM 


FEW 


ILL 


NOW 


RUN 


TOP 


AIM ' 


CAN 


FIT 


ITS 


OFF 


SAW 


TRY 


AIR 


CAR 


FIX 


JIG 


OLD 


SAY 


TUB 


ALL 


CAV 


FOR 


JOB 


ONE 


SEA 


TWO 


AND 


COL 


FOX 


KEG 


OUR 


SEE 


USE 


ANY 


CPL 


GAL 


LAW 


OUT 


SET 


VAT 


APT 


CUT 


GAS 


LAY 


OWE 


SGT 


WAR 


ARC 


CWT 


GEN 


LET 


OWN 


SHE 


WAS 


ARE 


DAY 


. GET 


LOT 


PAR 


SIX 


WAY 


ARM 


DID 


GHQ 


LOW 


PAY 


SPY 


WET 


ASK 


DIE 


GOT 


MAJ 


PEN 


SUM 


WGT 


BAD 


DOG 


GUN 


MAN 


PER 


SUN 


WON 


BAG 


DRY 


HAD 


MAT 


PIN 


TAN 


YET 


BAR 


DUE 


HAM 


MEN- 


PUT 


TAX 


YOU 


ABLE 


BOTH 


EACH 


FOUR LETTER WORDS 
FLEE 


HIGH 


LATE . 


MAIN 


AIDE 


. BULB 


EAST 


FORM 


HILL 


LEAD 


MANY 


ALLY 


BULK 


EASY 


FOUR 


HITS 


LEAK 


MASK 


ALSO 


CALL 


EDGE 


FROM 


HOLD 


LEFT 


MASS 


AREA 


CELL 


EYES 


FULL 


HOOK 


LESS 


MEAT 


ARMY 


CITY 


FALL 


FUSE 


INTO 


LIEU 


MEET 


ASIA 


CODE 


FARM 


FUZE 


ITEM 


LINE 


MESS 


AWAY 


COOK 


FAST 


GUNS 


JOIN 


LIST 


MIKE 


AXIS 


DARK 


FEEL 


HALF 


JULY 


LOAD 


MILE 


BACK 


DASH 


FEET 


HALT 


JUNE 


LONG 


MINE 


BASE 


DATE 


FELL 


HAND 


JUST 


LOOK 


MORE 


BEEN 


DAYS . 


FILE 


HARD 


KEEP 


LOSS 


MOVE 


BLUE 


DIRT 


FIRE 


HAVE 


KIND 


LOST 


MTCL 


BODY 


DOWN 


FIRM 


HEAD 


KING 


LOVE 


MULE' 


BOMB 


DRAW 


FIVE 


HERD 


LAND 


MADE 


NAVY 


BOOK 


DUMP 


FLAG 


HERE 


LAST 


MAIM 


NEAR 



RESTRICTED' 



3-2 



REF ID: A5 68 95 



RESTRICTED 

1 , 

FOUR LETTER WORDS— Continued 



NEXT 


PARK 


REAR 


SHOT 




TEAM 


TOOK 


WEST 


NINE 


PASS 


RIOT 


SIDE 




TENT 


TOOL 


WHAT 


NOON 


PIPE * 


ROAD 


SOME 




TEXT 


TOWN 


WHEN - 


NOTE 


PLAN 


ROUT 


SOON 




THAN 


TYPE 


WILL 


OBOE 


POST 


RULE 


STOP 




THAT 


UNIT 


WIRE 


OMIT 


PUMP 


RUSH 


SUNK 




THEM 


VARY 


WITH 


ONCE 


PUSH 


SAID 


TAKE 




THEN 


•VERY 


XRAY 


ONLY 


RAID 


SAME 


TALK 




THEY 


WEAK 


YOKE 


OPEN 


RAIL 


SANK 


TANK 




THIS 


WEEK 


ZERO 


ORAL 


RAIN 


SEEN 


TARE 




TIME 


WELL 


ZONE 


OVER 


RANK 


SHIP 


TASK 




TONS 


WERE 




! 






FIVE LETTER WORDS 








ABOUT 


BOATS 


DECKS 


FIGHT 


LATER 


PRIOR 


SHIPS 


TITLE 


AFTER 


BOMBS 


DEFER 


FIRES 


l^EAST 


PROOF 


SHORE 


TODAY 


AGAIN 


BOOTH 


DELAY 


FIRST 


LEAVE 


. PROVE 


SIEGE 


TOTAL 


AGENT 


BREAK 


DEPOT 


FLANK 


LEVEL 


QUEEN 


SIGHT 


TRACT 


ALARM 


BRIBE 


DEPTH 


FLARE 


LIGHT 


QUICK 


SIXTH 


TRAIN 


ALERT 


BROKE 


DOCKS 


FLATS 


LIMIT 


QUIET 


SIXTY 


TROOP 


ALIGN 


BURST 


DRAWN 


FLEET 


LOCAL 


RADIO 


SLOPE 


TRUCE 


ALINE 


CANAL 


DRESS 


FOGGY 


MAJOR 


RAFTS 


SMALL 


TRUCK 


ALLOW 


CASES 


DRILL 


FORCE 


MARCH 


RAIDS 


SMOKE 


UNDER 


ALONG 


CAUSE 


DRIVE 


FORTY 


METER 


RALLY 


SOUTH 


UNION 


AMONG 


CEASE 


EAGER • 


FRESH 


MILES 


RANGE 


SPEED 


UNITS 


ANNEX 


CHECK 


EARLY 


FRONT 


MOTOR 


RAPID 


SPELL 


USUAL 


APPLY 


CHIEF 


EIGHT 


GATES 


NAVAL 


REACH 


SPLIT 


VALOR 


APRIL 


CLEAR 


ENEMY 


GAUGE' 


NIGHT 


READY 


SQUAD 


VISIT 


AREAS 


CLERK 


ENTER 


GIVEN 


NINTH 


REFER 


STAFF 


' VITAL 


ARMOR 


CLOSE 


EQUAL 


GOING 


NORTH 


REPEL 


STAKE 


VOCAL 


ASSET 


COAST 


EQUIP 


GROUP 


ORDER 


RIDGE 


START 


VOICE 


AWAIT 


COLON 


ERASE 


GUARD 


OTHER 


RIGHT 


x STEEL 


WAGON 


AWARD 


COMMA 


ERROR 


GUEST 


PACKS 


RIGID 


SUGAR 


WEIGH 


BAKER 


CORPS 


ETHER 


HEAVY 


PAIRS 


RIVER 


TAKEN 


WHEEL 


BANKS 


COUNT 


EVERY 


HONOR 


PARTY 


ROGER 


TANKS 


WHERE 


BARGE 


COVER 


FATAL 


HORSE 


PETER 


ROUTE 


TENTH 


WHICH 


BEACH 


CREEK 


FEARS 


HOURS 


PLACE 


SCALE 


THEIR 


WIDTH 


BEGIN 


CREST 


FERRY 


HOUSE 


PLAIN 


SEIZE 


THERE 


WIPED 


BEING 


CROSS 


FIELD 


ISSUE 


PLANS 


SEVEN 


THESE 


WOODS 


BLACK 


CURVE 


FIFTH 


JAPAN 


POINT 


SHELL 


THIRD 


YARDS 


BLIND 


DAILY 


FIFTY 


LARGE 


PRESS 


SHIFT 


THREE 


ZEBRA 



o 




REDTRICTEPr 



REF ID : A56895 



RES¥niC ¥E D 



SIX LETTER WORDS 



ACCEPT 


BOMBED 


DEGREE 


FIERCE 


LESSON 


OTHERS 


• RESUME 


SUFFER 


ACCESS 


BOMBER 


DEPART 


FILING 


LETTER 


Output 


RETIRE 


SUMMER 


ACROSS 


BOTTOM 


DEPEND 


FINISH 


LINING 


panama 


RETURN 


SUMMIT 


ACTION 


BRANCH 


DEPLOY 


FIRING 


LIQUID 


PARADE 


REVIEW 


SUMMON 


ACTIVE 


BREACH 


DESERT 


FLIGHT 


LITTER 


PARLEY 


RIDING 


SUNDAY 


ADJUST 


BREEZE 


DETACH 


FLYING 


LITTLE 


PASSED 


ROCKET 


SUNKEN 


ADVICE 


BRIDGE 


DETAIL 


FOLLOW 


LOCATE 


PASSES 


ROUTED 


SUNSET 


ADVISE 


BROKEN 


DEVICE 


FORCES 


LOSSES 


PATROL 


ROUTES 


SUPPLY 


AFFAIR 


BUREAU 


DEVISE 


FORMAL 


MANAGE 


PERIOD 


RUBBER 


SURVEY 


ALASKA 


CANADA 


DIRECT 


FORMED 


MANNER 


PICKET 


RUNNER 


SWITCH 


ALLEGE 


CANCEL 


DIVERT 


FOUGHT 


MANUAL 


PINCER 


SALARY 


SYSTEM 


ALLIED 


CANNOT 


DIVIDE 


FOURTH 


MEAGER 


PISTOL 


SCHEME 


TABLES 


ALLIES 


CANVAS 


DOCTOR 


FRIDAY 


MEDIUM 


PLACES 


SCHOOL 


TANKER 


ALWAYS 


CASUAL 


DOLLAR 


FUTURE 


MEMBER 


PLANES 


SCORED 


TARGET 


ANIMAL 


CAUSED 


DOWNED 


GARAGE 


METHOD 


POINTS 


SCREEN 


TATTOO 


ANNUAL 


CENTER 


DRYRUN 


GEORGE 


METRIC 


POISON 


SEAMAN 


TERROR 


ANYWAY 


CHANGE 


DUGOUT 


GREASE 


MINING 


POLICE 


SEAMEN 


THIRTY 


APPEAR 


CHARGE 


DURING 


GROUND 


MINUTE 


PONTON 


SEARCH 


THOUGH 


ARABIA 


CHEESE 


EFFECT 


GUNNER 


MIRROR 


POSTAL 


SECOND 


T! !REAT 


ARMIES 


CHURCH 


EFFORT 


HALTED 


MOBILE 


PREFER 


SECTOR 


TRAINS 


ARMORY 


CIPHER 


EIGHTH 


HAMMER 


• MONDAY 


PROMPT 


SECURE 


TRENCH 


ARREST 


. CIRCLE 


EIGHTY 


HAPPEN 


MORALE 


PROPER 


SELECT 


TROOPS 


ARRIVE 


COFFEE 


EITHER 


HARBOR 


MORTAR 


PURSUE 


SERIAL 


TURRET 


ASSETS 


COLORS 


ELEVEN 


HELPER 


MOVING 


RADIAL 


SETTLE 


TWELVE 


ASSIST 


COLUMN 


EMBARK 


HIGHER 


MURDER 


RAIDED 


SEVERE 


TWENTY 


ASSURE 


COMBAT 


EMPLOY 


HOURLY 


MUZZLE 


RATION 


SHELLS 


UNABLE 


ATTACH 


COMMIT 


ENCODE 


INDEED 


NAUGHT 


RAVINE 


SIGCOM 


UNITED 


ATTACK 


COMMON 


ENGAGE 


INFORM 


NEARER 


RECORD 


SIGNAL 


UNLESS 


ATTAIN 


CONVEY 


ENGINE 


INLAND 


NINETY 


REDUCE 


SINGLE 


VALLEY 


AUGUST 


CONVOY 


ENROLL 


INTEND 


NORMAL 


REFILL 


SLIGHT 


VERBAL 


BANNER 


COURSE 


ENTIRE 


INTENT 


NOTING 


REFUGE 


SPHERE 


VERIFY 


BARBED 


CREDIT 


ERASER 


INVENT 


NOUGHT 


REFUSE 


SPOOLS 


VESSEL 


BARGES 


CRISIS 


ESCORT 


ISLAND 


NOVICE 


REJECT 


SPOONS 


VICTIM 


BATTEN 


CRITIC 


EUROPE 


ISSUES 


NOZZLE 


RELIEF 


STATES 


VICTOR 


BATTLE 


DAMAGE 


EXCEPT 


KEEPER 


NUMBER 


REMAIN 


STATUS 


VISITS 


BEETLE 


DEBARK 


EXCESS 


KILLED 


OCCUPY 


REMEDY 


STRAFE 


VISUAL 


BEFORE 


DECIDE 


EXCITE 


LADDER 


OFFEND 


REPAIR 


STREET 


WEIGHT 


BETTER 


DECODE 


EXPECT 


LANDED 


OFFICE 


REPORT 


STRESS 


WIRING 


BEYOND 


DECREE 


EXPELS 


LAUNCH 


OPPOSE 


RESCUE 


STRIPS 


WITHIN 


BILLET 


DEFEAT 


EXPEND 


LEADER 


ORDERS 


RESIST 


SUBMIT 


WOODED 


BITTER 


DEFECT 


EXTEND 


LEAGUE 


ORIENT 


RESULT 


SUDDEN 


ZIGZAC- 


BODIES 


DEFEND 


EXTENT 













SEVEN LETTER WORDS 



ABANDON 


ALMANAC 


APPOINT 


ASIATIC 


AVIATOR 


BATTERY 


BETWEEN 


ABSENCE 


AMMETER 


APPROVE 


ASSAULT 


AWKWARD 


BATTLES 


BICYCLE 


ADDRESS 


ANALYZE 


ARMORED 


ATTACKS 


BAGGAGE 


BEARING 


BINDING 


ADVANCE 


ANOTHER 


ARRANGE 


ATTEMPT 


BALLOON 


BECAUSE 


BIVOUAC 


AGAINST 


ANTENNA 


ARRIVAL 


AVERAGE 


BARRAGE 


BEDDING 


BOMBARD 



3- 1 !' 



RESTRICTED 




REF ID: A5 68 95 



SEVEN LETTER WORDS— Continued 



BOMBERS 


DEBOUCH 


FITTING 


LANDING 


PACKAGE 


REQUEST 


SUPPOSE 


BOMBING 


DECIDED 


FOGHORN 


LEADING 


PASSAGE 


REQUIRE 


SURPLUS 


BOYCOTT 


DECLARE 


FORCING 


LECTURE 


PASSIVE 


RESERVE 


SUSPEND 


BRIBERY 


DECODED 


FORGING 


LIAISON 


' PATROLS 


RESPECT 


TACTICS 


BRIGADE 


DEFENSE 


FORWARD 


LIBRARY 


PAYR'OLL 


RESPOND 


TALKING 


CALIBER 


DELAYED 


FOXHOLE 


LICENSE 


PLACING 


RETIRED 


TARGETS 


CALIBRE 


DELIVER 


FUELOIL 


LIFTING 


PLATO&N 


RETREAT 


TERRAIN 


CAPTAIN 


DERRICK 


FURNISH 


Lb At) TNG 


POUNDER 


REVENUE 


THATTHE 


CAPTIVE 


DESTROY 


FURTHER 


LOGICAL 


PRAIRIE 


REVERSE 


THROUGH 


CARRIER 


DETRAIN 


GASSING 


LOOKOUT 


PRECEDE 


REVOLVE 


TOBACCO 


CAVALRY 


DETRUCK 


GENERAL 


MACHINE 


PREPARE 


ROUTINE 


TONIGHT 


CENTRAL 


DEVELOP 


GETTING 


MANDATE 


PRESENT 


RUNNING 


TONNAGE 


CHANGES 


DIAGRAM 


GLASSES 


MANNING 


PRESSED 


SAILORS 


TORPEDO 


CHANNEL 


DISCUSS 


GRADUAL 


MAPPING 


PRIMARY 


SATISFY 


TRACTOR 


CHARLIE 


DISEASE 


GRENADE 


MARCHED 


PROCEED 


SECRECY 


TRAFFIC 


CHASSIS 


DISMISS 


GUARDED 


MARSHAL 


PROGRAM 


SECTION 


TRAWLER 


CIRCUIT 


DISTILL 


HALTING 


MARTIAL 


PROMOTE 


SECTORS 


TRIGGER 


CLIPPER 


DROPPED 


HASBEEN 


MAXIMUM 


PROPOSE 


SERVICE 


TUESDAY 


COASTAL 


EASTERN 


HEADING 


MEDICAL 


PROTECT 


SESSION 


TWELFTH 


COLLECT 


ECHELON 


HEAVIER 


MESSAGE 


PROTEST 


SETBACK 


UNKNOWN 


COLLEGE 


ELEMENT 


HIGHEST 


MESSING 


PROVOST 


SEVENTH 


UNUSUAL 


COLQNEL 


ELEVATE 


HOLDING 


MILITIA 


PURPOSE 


SEVENTY 


USELESS 


COMMAND 


EMBASSY 


HORIZON 


MINIMUM 


PURSUIT 


SEVERAL 


UTILITY 


COMMEND 


ENCODED 


HOSTILE 


MISFIRE 


PUSHING 


SHELLED 


VACANCY 


COMMENT 


ENEMIES 


HUNDRED 


MISSING 


QUARTER 


SHORTLY 


VARYING 


COMMUTE 


ENFORCE 


ICEBERG 


MISSION 


QUICKLY 


SIGNIFY 


VESSELS 


COMPANY 


ENGAGED 


ILLEGAL 


MORNING 


RADIATE 


SIMILAR 


VICTORY 


COMPASS 


ENTENTE 


ILLNESS 


NATURAL 


' RAIDING 


SIMPLEX 


VILLAGE 


CONCEAL 


ENTRAIN 


INCLUDE 


NEAREST 


RAILWAY 


SINKING 


VISIBLE 


CONDEMN 


ENTRUCK 


INFLICT 


NIGHTLY 


RAINING 


SIXTEEN 


VISITOR 


CONDUCT 


ENVELOP 


INITIAL 


NOTHING 


RAPIDLY 


SLOPING 


WARFARE 


CONFINE 


EXCLUDE 


INQUIRE 


NUMBERS 


REACHED 


SMOKING 


WARSHIP 


CONTACT 


EXPLAIN 


INQUIRY 


OBSERVE 


RECEIPT 


SOLDIER 


WEATHER 


CONTAIN 


EXPRESS 


INSPIRE 


OCTOBER 


RECEIVE 


STARTER 


WESTERN 


CONTROL 


EXTRACT 


INSTALL 


OFFENSE 


RECOVER 


STATION 


WHETHER 


CORRECT 


EXTREME 


INSTANT 


OFFICER 


RECRUIT 


STEAMER 


WILLIAM 


COUNCIL 


FALLING 


INVADED 


OMITTED 


REDUCED 


STOPPED 


WINDAGE 


COURIER 


FARTHER 


ISLANDS 


OPERATE 


REFUGEE 


STORAGE 


WITHOUT 


COVERED 


FEDERAL 


ISSUING 


OPINION 


REGULAR 


SUCCESS 


WITHTHE 


CROSSED 


FIFTEEN 


JANUARY 


ORDERED 


RELEASE 


SUGGEST 


WITNESS 


CRUISER 


FIGHTER 


JUMPOFF 


OUTPOST 


RELIEVE 


SUMMARY 


WOUNDED 


CURRENT! 


FILLING 


KITCHEN 


OUTSIDE 


REPAIRS 


SUNRISE 


WRECKED 


CYCLONE 


FINDING 


KILLING 


PACIFIC 


REPLACE 


SUPPORT 


WRITTEN 


DAMAGED; 


FISHING 
















EIGHT 


LETTER WORDS 






ACTIVITY 


• ADVANCED 


AIRBORNE 


AIRPLANE 


ANNOUNCE 


APPROACH 


ASSEMBLE 


ACTUALLY 


ADVANCES 


AIRCRAFT 


ALTITUDE 


ANTITANK 


APPROVAL 


ASSEMBLY 


ADJACENT 


ADVISING 


AIRDROME 


AMERICAN 


APPARENT 


ARMAMENT 


ASSIGNED 


ADJUTANT 


ADVISORY 


AIRFIELD 


ANALYSIS 


APPEARED 


ARRESTED 


ASSOONAS 



• - j'iflDTniCTEU 



3-5 



RESTRICTED 



REF ID: A56895 



EIGHT LETTER WORDS — Continued 



ATLANTIC 


CRITIQUE 


DRIFTING 


FORENOON 


MEDICINE 


PRIORITY 


SERGEANT 


ATTACKED 


CROSSING 


EASTERLY 


FORTRESS 


MEMORIAL 


PRISONER 


SHELLING 


ATTEMPTS 


CRUISERS 


EASTWARD 


FOURTEEN 


MERCIFUL 


PROBABLE 


SHIPPING 


AVIATION 


DAMAGING 


ECONOMIC 


FRONTAGE 


MESSAGES 


PROBABLY 


SIGHTING 


BARRACKS 


DARKNESS 


EFFECTED 


FUSELAGE 


MIDNIGHT 


PROGRESS 


SKIRMISH 


BARRAGES 


DAYLIGHT 


EFFICACY 


GARRISON 


MILITARY 


PROHIBIT 


SOLDIERS 


BATTERED 


DECEMBER 


EIGHTEEN 


GROUNDED 


MISFIRES 


PROTESTS 


SOUTHERN 


BATTLING 


DECIPHER 


ELEMENTS 


GROUPING 


MISSIONS 


PROTOCOL 


SPECIFIC 


BESEIGED 


DECISION 


ELEVENTH 


GUARDING 


MOBILIZE 


PURPOSES 


SPOTTING 


BILLETED 


DECISIVE 


ELIGIBLE 


HAVEBEEN 


MONOPOLY 


QUARTERS 


SQUADRON 


BOUNDARY 


DECLARED 


EMPLOYEE 


HINDERED 


MOUNTAIN 


RAILHEAD 


STANDARD 


BREAKING 


DECREASE 


EMPLOYER 


HOSPITAL 


MOVEMENT 


RAILROAD 


STATIONS 


BUILDING 


DEDICATE 


ENCIPHER 


HOWITZER 


NATIONAL 


RALLYING 


STRATEGY 


BULLETIN 


DEFEATED 


ENCIRCLE 


IDENTIFY 


NAUTICAL 


RECEIVER 


SUFFERED 


BUSINESS 


DEFENDED 


' ENFILADE 


IGNITION 


NINETEEN 

| 


RECORDER 


SUITABLE 


CALAMITY 


DEFENDER 


ENGAGING 


IMPROPER 


NORTHERN 


REDCROSS 


SUPERIOR 


CAMPAIGN 


DEFENSES 


ENGINEER 


IMPROVED 


^NOVEMBER 


REENLIST 


SUPPLIES 


CANISTER 


DEFERRED 


ENLISTED 


INCIDENT 


[OBSERVED 


REGIMENT 


SURPRISE 


CAPACITY 


DEFINITE 


ENORMOUS 


INDICATE 


.'OBSERVER 


REGISTER 


SURROUND 


CAPTURED 


DELAYING 


ENROLLED 


INDIRECT 


(obsolete 


REJECTED 


SURVIVED 


CARELESS 


DEMANDED 


ENTERING 


INFANTRY 


(OBSTACLE 


REJECTOR 


SUSPENSE 


CARRIAGE 


DEPARTED 


. ENTRENCH 


INFECTED 


OCCUPIED 


REMEDIES 


SWEEPING 


CARRIERS 


DEPLOYED 


ENVELOPE 


INITIATE 


OFFENDED 


REMEMBER 


SWIMMING 


CARRYING 


DEPORTED 


EQUALIZE 


INSECURE 


OFFICERS 


REPAIRED 


TACTICAL 


CASUALTY 


DESCRIBE 


EQUIPAGE 


INSIGNIA 


OFFICIAL 


REPEATER 


TAXATION 


CAUSEWAY 


DESERTED 


ESCORTED 


INSTRUCT 


OPERATOR 


REPELLED 


TELEGRAM 


CEMETERY 


DESERTER . 


ESTIMATE 


INTEREST 


OPPOSING 


REPLACED 


TERRIBLE 


CENTERED 


DESPATCH 


EUROPEAN 


INTERIOR 


OPPOSITE 


REPORTED 


TERRIFIC 


CHAPLAIN 


DETACHED 


EVACUATE 


INTERNAL 


ORDINATE 


REPULSED ' 


THATHAVE 


CHEMICAL 


DETECTOR 


EXCAVATE 


INTRENCH 


ORDNANCE 


REQUIRED 


. THIRTEEN 


CIRCULAR 


DETONATE 


EXCHANGE 


INVADING 


OUTBOARD 


RESEARCH 


THOUSAND 


CITATION 


DEVELOPE 


EXERCISE 


INVASION 


OUTGUARD 


RESERVES 


THURSDAY 


CIVILIAN 


DICTATED 


EXPANDED 


INVENTED 


OUTPOSTS 


RESPECTS 


TOMORROW 


CLERICAL 


DICTATOR 


EXPEDITE 


JETPLANE 


PAINTING 


RESTORED 


TOTALING 


CODEBOOK 


DIMINISH 


EXPELLED 


JUNCTION 


PARALLAX 


RETIRING 


TRAILERS 


COMMANDS 


DIRECTOR 


EXPENDED 


LANGUAGE 


PARALLEL 


RETURNED 


TRAINING 


COMMENCE 


DISARMED 


EXPENSES 


LATITUDE 


PASSPORT 


REVIEWED 


TRANSFER 


COMMERCE 


DISASTER 


EXTENDED 


LETTERED ' 


PLANNING 


REVOLVER 


TRAVERSE 


COMPLETE 


DISLODGE 


EXTERIOR 


LIMITING 


POLITICS 


RIGOROUS 


TRAWLERS 


COMPOSED 


DISPATCH 


FACTIONS 


LOCATION 


PONTOONS 


SABOTAGE 


VEHICLES 


CONCLUDE 


DISPERSE 


FATALITY 


LUMINOUS 


POSITION 


SANITARY 


VICINITY 


CONCRETE 


DISTANCE 


FEBRUARY 


MAINTAIN 


POSITIVE 


SATURDAY 


VIGOROUS 


CONFLICT 


DISTRESS 


FERRYING 


MANDATED 


POSSIBLE 


SCHEDULE 


WARSHIPS 


CONGRESS 


DISTRICT 


FIGHTERS 


MANEUVER 


PpSTPONE 


SEABORNE 


WESTERLY 


CONTINUE 


DIVIDING 


FIGHTING 


MARCHING 


PREPARED 


SEALEVEL 


WESTWARD 


CONTRACT 


DIVISION 


FINISHED 


MARITIME 


PkESERVE 


SELECTED 


WINDWARD 


CORPORAL 


DOCTRINE 


FLANKING 


MATERIAL 


PRESSING 


SENTENCE 


WIRELESS 


CORRIDOR 


DOMINANT 


FLEXIBLE 


MATERIEL 


PRESSURE 


SENTINEL 


WITHDRAW 


COVERING 


DRESSING 


FOOTHOLD 


MECHANIC 


PRINTING 


SEPARATE 


WITHDREW 



CRITICAL 

RESTRICTED 




REF ID : A56895 



- HEaTHICTED . 



NINE LETTER WORDS 



ACCESSORY 
ACCOMPANY 
ACCORDING 
ADDRESSED 
ADDRESSES 
ADMISSION 
ADVANCING 
ADVANTAGE 
AERODROME 
AEROPLANE 
AFTERNOON 
AGREEMENT 
AIRDROMES 
, AIRPLANES 
ALLOTMENT 
ALLOWANCE 
ALTERNATE 
AMBULANCE 
AMUSEMENT 
ANNOUNCED 
ANONYMOUS 
APPARATUS 
APPOINTED 
ARBITRARY 
ARTILLERY 
ASCENSION 
ASSAULTED 
ASSISTANT 
ASSOCIATE 
ASSURANCE 
ATTACKING 
ATTEMPTED 
ATTENTION 
AUTOMATIC 
AVAILABLE 
BALLISTIC 
BAROMETER 
BATTALION 
BATTERIES 
BEACHHEAD 
BEGINNING 
BLOCKADED 
BOMBARDED 
BRIGADIER 
BUILDINGS 
CABLEGRAM 
CAMPAIGNS 
CANCELLED 
CARTRIDGE 



CENTERING 
CHALLENGE 
CHARACTER 
CHAUFFEUR 
CHRONICAL 
CIGARETTE 
CIRCULATE 
CIVILIANS 
CLEARANCE 
COALITION 
COLLAPSED 
COLLISION 
COMBATANT 
COMMANDED 
COMMANDER 
COMMITTEE 
COMPANIES 
COMPELLED 
COMPLETED 
CONDEMNED 
CONDENSED 
CONDITION 
CONFERRED 
CONFIDENT 
CONFLICTS 
CONQUERED 
CONTINUAL 
S CONTINUED 
CONTINUES 
COOPERATE 
CORRECTED 
CRITICISE 
CRITICISM 
DEBARKING 
DECREASED 
DEFECTIVE 
DEFENSIVE 
DEFICIENT 
DEPARTURE 
DEPENDENT 
DESCRIBED 
DESIGNATE 
DESTITUTE 
DESTROYED 
DESTROYER 
DETENTION 
DETERMINE 
DETONATED 
DETRAINED 



DEVELOPED 
DIETITIAN 
DIFFERENT 
DIFFICULT 
DIMENSION 
DIRECTION 
DIRIGIBLE 
DISAPPEAR 
DISCUSSED 
DISINFECT 
DISMISSAL 
DISPERSED 
DISTRICTS 
DIVISIONS 
DOMINANCE 
DOMINATED 
ECHELONED 
EFFECTIVE 
EFFICIENT 
ELABORATE 
ELEVATION 
ELSEWHERE 
EMBASSIES 
EMERGENCY 
- EMPLOYING 
ENDURANCE 
ENGINEERS 
ENLISTING 
ENTRAINED 
EQUIPMENT 
ESTABLISH 
ESTIMATED 
ESTIMATES 
EXCESSIVE 
EXCLUSION 
EXCLUSIVE 
EXECUTIVE 
EXERCISES 
EXHIBITED 
EXPANSION 
EXPANSIVE 
EXPENSIVE 
EXPLOSION 
EXPLOSIVE 
EXTENDING 
EXTENSION 
EXTENSIVE 
FIFTEENTH 
FIREALARM 



FORMATION 

FORTIFIED 

FRONTLINE 

GROUPMENT 

GYROMETER 

HOSTILITY 

HURRICANE 

IDENTICAL 

IMMEDIATE 

IMPORTANT 

IMPRESSED 

INCENTIVE 

INCIDENCE 

INCIDENTS 

INCLINING 

INCLUDING 

INCLUSIVE 

INCREASED 

INDEMNITY 

INDICATED 

INFLATION 

INFLICTED 

INFLUENCE 

INHABITED 

INSTANTLY 

INTEGRITY 

INTENSIVE 

INTENTION 

INTERCEPT 

INTERDICT 

INTERFERE 

INTERMENT 

INTERPOSE 

INTERRUPT 

INTERVENE 

INTERVIEW 

INVENTION 

IRREGULAR 

KILOMETER 

LAUNCHING 

LIABILITY 

LOGISTICS 

LONGITUDE 

MAINTAINS 

MANGANESE 

MECHANISM 

MEMORANDA 

MESSENGER 

MOTORIZED 



MOVEMENTS 

MUNITIONS 

NAVALBASE 

NECESSARY 

NECESSITY 

NEGLIGENT 

NEWSPAPER 

NORTHEAST 

NORTHERLY 

NORTHWARD 

NORTHWEST 

NUMBERING 

OBJECTION 

OBJECTIVE 

OBTAINING 

OCCUPYING 

OFFENSIVE 

OFFICIALS 

OPERATING 

OPERATION 

OSCILLATE 

OUTSKIRTS 

PARACHUTE 

PARAGRAPH 

PARTITION 

PASSENGER 

PATRIOTIC 

PENETRATE 

PERMANENT 

PERSONNEL 

PLACEMENT 

POLITICAL 

POPULATED 

POSITIONS 

PRACTICAL 

PRECEDING 

PREFERRED 

PREMATURE 

PREPARING 

PRESIDENT 

PRINCIPAL 

PRINCIPLE 

PRISONERS 

PROCEDURE 

PROCEEDED 

PROJECTOR 

PROMOTION 

PROPOSALS 

PROTECTED 



PROTECTOR 

PROTESTED 

PROVISION 

PROXIMITY 

RADIATION 

RADIOGRAM 

READINESS 

REARGUARD 

REBELLION 

RECEIVING 

RECOGNIZE 

RECOMMEND 

REENFORCE 

REFERENCE 

REFILLING 

REGARDING 

REINFORCE 

REINSTATE 

REMAINDER 

REMAINING 

REPRESENT 

REPRISALS 

REQUESTED 

REQUIRING 

RESOURCES 

RESTRAINT 

RETENTION 

RETURNING 

REVIEWING 

SCREENING 

SEAPLANES 

SECRETARY 

SEMICOLON 

SEMIRIGID 

SEPTEMBER 

SERIOUSLY 

SERVICING 

SEVENTEEN 

SHELLFIRE 

SITUATION 

SIXTEENTH 

SOUTHEAST 

SOUTHWARD 

SOUTHWEST 

SPEARHEAD 

STANDARDS 

STATEMENT 

STRAGGLER 

STRATEGIC 



ftEaTRICTED 




3-7 



RESTRICTED 



REF ID : A56895 



SUBMITTED 

SUCCEEDED 

SURRENDER 

SUSPECTED 



ACCEPTABLE 

ACCEPTANCE 

ACCIDENTAL 

ACCORDANCE 

ACTIVITIES 

ADDITIONAL 

AIRCONTROL 

AIRSUPPORT 

ALLEGIANCE 

ALLOCATION 

AMBASSADOR 

AMMUNITION 

ANTEDATING 

ANTICIPATE 

APPARENTLY 

APPEARANCE 

APPROACHED 

ARMOREDCAR 

ARTIFICIAL 

ASPOSSIBLE 

ASSEMBLIES 

ASSESSMENT 

ASSIGNMENT 

ASSISTANCE 

ATOMICBOMB 

ATTACHMENT 

ATTAINMENT 

ATTEMPTING 

AUDIBILITY 

AUTOMOBILE 

BALLISTICS 

BATTLESHIP 

BEENNEEDED 

BRIDGEHEAD 

CAMOUFLAGE 

CAPABILITY 

CASUALTIES 

CENSORSHIP 

CENTRALIZE 

CIRCUITOUS 

COASTGUARD 

COLLECTING 

COLLECTION 



NINE LETTER WORDS— Continued 



SUSPENDED TELEPHONE THEREFORE UNTENABLE 


WEDNESDAY 


SUSPICION TENTATIVE TRANSPORT VARIATION 


WITNESSES 


TECHNICAL TERRITORY TWENTIETH WATERTANK 


YESTERDAY 


TECHNIQUE 










TEN LETTER WORDS 






COLLISIONS 


DESPATCHES 


EXPENDABLE 


MAINTAINED 


COMMANDANT 


DESTROYERS 


EXPERIENCE 


MANAGEMENT 


COMMANDEER 


DETACHMENT 


EXPERIMENT 


MECHANIZED 


COMMANDING 


DETERMINED 


EXPLOSIONS 


MEMORANDUM 


COMMISSARY 


DETONATION 


EXTINGUISH 


MILLIMETER 


COMMISSION 


DETRAINING . 


FACILITIES 


MOTORCYCLE 


COMMITMENT 


DETRUCKING 


FLASHLIGHT 


NATURALIZE 


COMMUNIQUE 


DIFFERENCE 


FORMATIONS 


NAVIGATION 


COMPENSATE 


DIPLOMATIC 


FOUNDATION 


NEGLIGENCE 


COMPLETELY 


DIRECTIONS 


FOURTEENTH 


NEWSPAPERS 


COMPRESSED 


DISCIPLINE 


FRONTLINES 


NINETEENTH 


CONCERNING 


DISCUSSION 


GEOGRAPHIC 


OBJECTIVES 


CONCESSION 


DISPATCHED 


GONIOMETER 


OCCUPATION 


CONCLUSION 


DISPATCHER 


GOVERNMENT 


ONEHUNDRED 


CONDITIONS 


DISPATCHES 


GYROSCOPIC 


OPERATIONS 


CONFERENCE 


DISPERSION 


HYDROMETER 


OPPOSITION 


CONFESSION 


DISTRESSED 


HYGROMETER 


OVERCOMING 


CONFIDENCE 


DISTRIBUTE 


ILLITERATE 


PATROLLING 


CONNECTING 


DIVEBOMBER 


ILLUMINATE 


PERMISSION 


CONNECTION 


DOMINATION 


ILLUSTRATE 


PERSISTENT 


CONSPIRACY 


EFFICIENCY 


IMPASSIBLE 


PHOSPHORUS 


CONSTITUTE 


EIGHTEENTH 


IMPOSSIBLE 


POPULATION 


CONTINGENT 


ELEMENTARY 


IMPRESSION 


POSSESSION 


CONTINUOUS 


EMPLOYMENT 


IMPRESSIVE 


POSTOFFICE 


CONTRABAND 


ENCIPHERED 


INCENDIARY 


PRECEDENCE 


CONVENIENT 


ENCIRCLING 


INDICATING 


PREFERENCE 


COORDINATE 


ENEMYTANKS 


INDICATION 


PRESCRIBED 


CORRECTION 


ENGAGEMENT 


INDIVIDUAL 


PROHIBITED 


CREDENTIAL 


ENLISTMENT 


INFLICTING 


PROPORTION 


CROSSROADS 


ENROLLMENT 


INSECURITY 


PROTECTION 


DEBOUCHING 


ENTERPRISE 


INSPECTION 


PROVISIONS 


DECIPHERED 


ENTRENCHED 


INSTRUCTED 


QUARANTINE 


DECORATION 


ENTRUCKING 


INSTRUCTOR 


RECEPTACLE 


DEDICATION 


EQUIVALENT 


INSTRUMENT 


RECREATION 


DEFICIENCY 


ESTIMATION 


INTERNMENT 


RECRUITING 


DEFINITION 


EVACUATING 


INVITATION 


REENFORCED 


DEMOBILIZE 


EVACUATION 


IRRIGATION 


REENLISTED 


DEPARTMENT 


EVALUATION 


KILOMETERS 


REGIMENTAL 


DEPENDABLE 


EXCAVATION 


LABORATORY 


REGULATION 


DEPLOYMENT 


EXCITEMENT 


LIEUTENANT 


REINFORCED 


DEPRESSION 


EXHIBITION 


LIMITATION 


RESISTANCE 


DESIGNATED 


EXPEDITING 


LOCOMOTIVE 


RESPECTFUL 


DESPATCHED 


EXPEDITION 


MACHINEGUN 


RESTRICTED 




REF ID: A5 68 95 



- REaTRICTCD ■ 



TEN LETTER WORDS— Continued 

REVOLUTION SUBMISSION SUSPENSION TRANSPORTS UNEXPENDED 
SANITATION SUBSTITUTE SUSPICIONS TRANSVERSE UNSUITABLE 
SEPARATION SUCCESSFUL SUSPICIOUS TROOPSHIPS VICTORIOUS 
SIGNALLING SUCCESSIVE ' THIRTEENTH TWENTY FIVE VISIBILITY 
SIMILARITY SUFFICIENT THREATENED UNDERSTAND WILLATTACK 
STATISTICS SUPPORTING TRAJECTORY UNDERSTOOD WITHDRAWAL 
SUBMARINES 

ELEVEN LETTER WORDS 

ACCESSORIES CONCENTRATE EMPLACEMENT IWTERfcERPTS REAPPOINTED 
AERONAUTICS CONFINEMENT ENCOUNTERED INTERESTING RECOGNITION 
ALTERNATING CONSTITUTED ENEMYPLANES INTERFERING RECOMMENDED 
APPLICATION CONSUMPTION ENFORCEMENT INTERPRETER RECONNOITER 
APPOINTMENT CONTINENTAL ENGAGEMENTS INTERRUPTED REPLACEMENT 
APPROACHING CONTROVERSY ENGINEERING INTERVENING REQUIREMENT 
APPROPRIATE COOPERATION ESTABLISHED INVESTIGATE REQUISITION 
APPROXIMATE CORPORATION ESTIMATEDAT LEGISLATION RESERVATION 
ARBITRATION CORRECTNESS EXAMINATION * LIGHTBOMBER RESIGNATION 
ARMOREDCARS CREDENTIALS EXPLANATION MAINTENANCE RESPONSIBLE 
ARRANGEMENT CUSTOMHOUSE EXTENSIVELY MANUFACTURE RESTRICTION 
ASSESSMENTS DEBARKATION EXTERMINATE ' MEASUREMENT RETALIATION 
ASSIGNMENTS DEMONSTRATE FINGERPRINT | NATIONALISM RETROACTIVE 
ASSOCIATION DESCRIPTION FIRECONTROL 1 NATIONALITY SCHOOLHOUSE 
BATTLEFIELD DESCRIPTIVE HEAVYBOMBER - NAVALATTACK SEVENTEENTH 
BATTLESHIPS DESIGNATION HEAVYLOSSES 1 NAVALBATTLE SEVENTYFIVE 
BELLIGERENT DESTRUCTION HOSTILITIES NAVALFORCES SIGNIFICANT 
BLOCKBUSTER DETERIORATE IMMEDIATELY NECESSITATE SMOKESCREEN 
BOMBARDMENT DEVELOPMENT IMMIGRATION OBSERVATION STRATEGICAL 
CATASTROPHE DISAPPEARED " IMPEDIMENTA OVERWHELMED SUBSISTENCE 
CERTIFICATE DISCONTINUE IMPROVEMENT PARENTHESIS SUITABILITY 
CIRCULATION DISCREPANCY INCOMPETENT PARENTHESES SUPERIORITY 
COEFFICIENT DISINFECTED INDEPENDENT . PENETRATION SURRENDERED 
COINCIDENCE DISPOSITION INFLAMMABLE PERFORMANCE SYNCHRONIZE 
COMMUNICATE DISTINCTION INFORMATION PHILIPPINES TEMPERATURE 
COMMUNIQUES DISTINGUISH INSPIRATION PHOTOGRAPHY THERMOMETER 
COMPARTMENT DYNAMOMETER INSTITUTION PREARRANGED TOPOGRAPHIC 
COMPETITION ECHELONMENT INSTRUCTION PREPARATION TRADITIONAL 
COMPOSITION EFFECTIVELY INSTRUMENTS PRELIMINARY TRANSFERRED 
COMPUTATION ELECTRICITY ' INTELLIGENT PROGRESSIVE WITHDRAWING 
CONCEALMENT EMBARKATION INTERCEPTED RANGEFINDER 

TWELVE LETTER WORDS 

ADVANTAGEOUS CARELESSNESS CONCENTRATED CONSIDERABLE COORDINATION 
AGRICULTURAL COMMENCEMENT CONCILIATION CONSTITUTING DECENTRALIZE 
ANNOUNCEMENT COMMENDATION CONFIDENTIAL CONSTITUTION DECIPHERMENT 
ANTIAIRCRAFT COMMISSIONED CONFIRMATION CONSTRUCTION DEMONSTRATED 
ANTICIPATION COMMISSIONER CONFISCATION CONTINUATION DEPARTMENTAL 
BREAKTHROUGH COMPENSATION CONFORMATION CONVALESCENT DIFFICULTIES 
CANCELLATION COMPLETENESS CONSCRIPTION CONVERSATION DISORGANIZED 



3-9 



R ESTRICTED 



REF ID: A5 68 95 



DISPLACEMENT 

DISSEMINATED 

DISTRIBUTING 

DISTRIBUTION 

EMPLACEMENTS 

ENCIPHERMENT 

ENTANGLEMENT 

ENTERPRISING 

FIGHTERPLANE 

GENERALALARM 

GENERALSTAFF 

GEOGRAPHICAL 

HEADQUARTERS' 

HEAVYBOMBERS 



ACCOMMODATION 

APPROXIMATELY 

CHRONOLOGICAL 

CIRCUMSTANCES 

COMMUNICATION 

CONCENTRATING 

CONCENTRATION 

CONGRESSIONAL 

CONSIDERATION 



ADMINISTRATION 

ADMINISTRATIVE 

CENTRALIZATION 

CHARACTERISTIC 

CIRCUMSTANTIAL 

CLASSIFICATION 

CORRESPONDENCE 



TWELVE LETTER WORDS— Continued 



HYDROGRAPHIC 

ILLUMINATING 

ILLUMINATION 

ILLUSTRATION 

INAUGURATION 

INCOMPETENCE 

INEFFICIENCY 

INSTRUCTIONS 

INTELLIGENCE 

INTERDICTION 

INTERFERENCE 

INTERMEDIATE 

INTERRUPTION 

INTERVENTION 



INTRODUCTION 

INTRODUCTORY. 

IRREGULARITY.' 

LIGHTBOMBERS 

MARKSMANSHIP 

MEASUREMENTS 

MEDIUMBOMBER 

MOBILIZATION 

NONCOMBATANT 

NORTHWESTERN 

OBSTRUCTIONS 

ORGANIZATION 

PREPARATIONS 

PREPAREDNESS 



PRESERVATION 

PRESIDENTIAL 

PROCLAMATION 

psychromeTer 

RADIOSTATION 

RECREATIONAL 

REENLISTMENT 

REGISTRATION 

REPLACEMENTS 

RESPECTFULLY 

ROADJUNCTION 

SATISFACTORY 

SEARCHLIGHTS 

SHARPSHOOTER 



THIRTEEN LETTER WORDS 



CORRESPONDING 

COUNTERATTACK 

DECENTRALIZED 

DEMONSTRATION 

DEPENDABILITY 

DETERMINATION 

DISAPPEARANCE 

DISCREPANCIES 

DISSEMINATION 



DISTINGUISHED 

ENTERTAINMENT 

ESTABLISHMENT 

EXTERMINATION 

EXTRAORDINARY 

FIGHTERPLANES 

IMPRACTICABLE 

INDETERMINATE 

INSTALLATIONS 



INSTANTANEOUS 

INTERNATIONAL 

INVESTIGATION 

MEDIUMBOMBERS 

MISCELLANEOUS 

PRELIMINARIES 

QUALIFICATION 

QUARTERMASTER 

REAPPOINTMENT 



FOURTEEN LETTER WORDS 



DEMOBILIZATION 

DISCONTINUANCE 

DISTINGUISHING 

IDENTIFICATION 

INTERPRETATION 

INVESTIGATIONS 



IRREGULARITIES 

METEOROLOGICAL 

NATURALIZATION 

RECOMMENDATION 

RECONNAISSANCE 

RECONNOITERING 



•3 



_•> Q 



SIGNIFICANCE 

SIMULTANEOUS 

SOUTHWESTERN 

SUBSTITUTION 

SUCCESSFULLY 

TRANSFERRING 

TRANSMISSION 

TRANSPACIFIC 

UNIDENTIFIED 

UNITEDSTATES 

UNSUCCESSFUL 

VERIFICATION 

VETERINARIAN 



REENFORCEMENT 

REIMBURSEMENT 

REINFORCEMENT 

REINSTATEMENT 

REVOLUTIONARY 

SPECIFICATION 

TRANSATLANTIC 

WARDEPARTMENT 



RECONSTRUCTION 

REORGANIZATION 

REPRESENTATIVE 

RESPONSIBILITY 

SATISFACTORILY 

TRANSPORTATION 



■R ESTRICTED 




REF ID: A5 68 95 



TtESTIUCTED 



B. LIST OF WORDS USED IN MILITARY TEXT ARRANGED IN RHYMING ORDER 

ACCORDING TO WORD LENGTH 



THREE LETTER WORDS 



SEA 


SEE 


MAJ 


TAN 


TOP* 


$AT 


APT 


TAX 


JOB 


,AGE 


ADJ 


GEN 


GHQ 


■MAT 


BUT 


iFIX 


•ROB 


SHE 


ASK 


MEN 


BAR 


VAT 


•CUT 


MIX 


TUB 


THE 


GAL 


PEN 


CAR 


ACT 


OUT 


SIX 


,QMC 


DIE 


ALL 


TEN 


FAR 


GET 


PUT 


BOX 


ARC 


ONE 


ILL 


PIN 


PAR 


LET 


PVT 


FOX 


BAD 


ARE 


COL 


TIN 


WAR 


NET 


CWT 


DAY 


HAD 


USE 


v CPL 


TON 


HER 


SET 


YOU 


LAY 


ADD 


DUE 


CAM 


WON 


PER 


WET 


CAV 


PAY 


RED 


OWE 


HAM 


DUN 


AIR 


YET 


LAW 


SAY 


AID 


EYE 


AIM 


GUN 


o‘k)R 


SGT 


SAW 


WAY 


BID 


OFF 


HIM 


RUN 


|OUR 


WGT 


FEW 


ANY 


DID 


BAG 


ARM 


SUN 


GAS 


FIT 


NEW 


SPY 


RID 


KEG 


SUM 


OWN 


HAS 


GOT 


HOW 


DRY 


OLD 


BIG 


CAN 


AGO 


WAS 


LOT 


LOW 


TRY 


AND 


JIG 


MAN 


TOO 


HIS 


NOT 


NOW 


BUY 


END 


DOG 


NAN 


TWO 


ITS 














FOUR LETTER WOjRDS 








AREA 


MIKE 


BASE 


WEEK 


FELL 


JOIN 


PASS 


LIST 


ASIA 


YOKE 


FUSE 


TALK 


WELL 


NOON 


LESS 


LOST 


BULB 


ABLE 


DATE 


BULK 


HILL 


SOON 


MESS 


POST 


BOMB 


FILE 


LATE 


RANK 


WILL 


DOWN 


LOSS 


JUST 


HEAD 


MILE 


NOTE 


SANK 


FULL 


TOWN 


HITS 


ROUT 


LEAD 


MULE 


BLUE 


TANK 


TOOL 


ZERO 


DAYS 


NEXT 


LOAD 


RULE 


HAVE 


SUNK 


TEAM 


ALSO 


MEAT 


TEXT 


ROAD 


SAME 


FIVE 


BOOK 


THEM 


INTO 


\ THAT 


LIEU 


RAID 


TIME 


LOVE 


COOK 


ITEM 


' KEEP 


WHAT 


DRAW 


SAID 


SOME 


MOVE 


. HOOK 


MAIM 


SHIP 


FEET 


XRAY 


HOLD 


LINE 


FUZE 


LOOK 


FROM 


DUMP 


MEET 


AWAY 


HAND 


MINE 


HALF 


TOOK 


FARM 


PUMP 


LEFT . 


BODY 


LAND 


NINE 


FLAG 


DARK 


FIRM 


STOP 


OMIT 


THEY 


KIND 


ZONE 


KING 


PARK 


FORM 


NEAR 


UNIT 


ALLY 


HARD 


JUNE 


LONG 


MASK 


THAN 


REAR 


HALT 


ONLY 


HERD 


OBOE 


EACH 


TASK 


PLAN 


OVER 


TENT 


JULY 


ONCE 


PIPE 


HIGH 


ORAL 


BEEN 


FOUR 


SHOT 


ARMY 


MADE 


TYPE 


DASH 


MTCL 


SEEN 


EYES 


RIOT 


MANY 


AIDE 


TARE 


PUSH 


FEEL 


THEN 


THIS 


DIRT 


VARY 


SIDE 


HERE 


' RUSH 


RAIL 


WHEN 


AXIS 


EAST '■ 


VERY 


CODE 


WERE 


WITH 


CALL 


OPEN 


TONS 


FAST 


EASY 


FLEE 


FIRE 


BOTH 


FALL 


MAIN 


GUNS 


LAST 


■ CITY 


EDGE 


WIRE 


LEAK 


CELL 


RAIN 


MASS 


WEST 


NAVY 


TAKE 


MORE 


BACK 













RESTRICTED 




nESTHICTED 



REF ID : A56895 



FIVE LETTER WORDS 



COMMA 


SCALE 


ALONG 


CANAL 


WAGON 


PRIOR 


DRESS 


START 


ZEBRA 


TITLE 


AMONG 


FATAL 


UNION 


: MAJOR 


PRESS 


ALERT 


SQUAD 


ALINE 


BEACH 


VITAL 


COLON 


VALOR 


CROSS 


LEAST 


SPEED 


SLOPE 


REACH 


TOTAL 


DRAWN 


ARMOR 


FLATS 


COAST 


WIPED 


FLARE 


WHICH 


EQUAL 


RADIO 


HONOR 


BOATS 


CREST 


RIGID 


THERE 


MARCH 


USUAL 


EQUIP 


ERROR 


RAFTS 


GUEST 


RAPID 


WHERE 


WEIGH 


NAVAL 


TROOP 


MOTOR 


UNITS 


FIRST 


FIELD 


SHORE 


FRESH 


WHEEL 


GROUP 


AREAS 


TRACT 


BURST 


BLIND 


CEASE 


WIDTH 


STEEL 


CLEAR 


BOMBS 


FLEET 


ABOUT 


GUARD 


ERASE 


FIFTH 


REPEL 


SUGAR 


RAIDS 


QUIET 


ALLOW 


AWARD 


THESE 


TENTH 


LEVEL 


UNDER 


WOODS 


ASSET 


ANNEX 


THIRD 


CLOSE 


NINTH 


APRIL 


ORDER 


YARDS 


SHIFT 


TODAY 


BRIBE 


HORSE 


BOOTH 


SMALL 


DEFER 


MILES 


EIGHT 


DELAY 


PLACE 


CAUSE 


DEPTH 


SHELL 


REFER 


FIRES 


FIGHT 


READY 


VOICE 


HOUSE 


NORTH 


SPELL 


EAGER 


CASES 


LIGHT 


FOGGY 


FORCE 


ROUTE 


SOUTH 


DRILL 


ROGER 


GATES 


NIGHT 


DAILY 


TRUCE 


ISSUE 


SIXTH 


ALARM 


ETHER 


PACKS 


RIGHT 


RALLY 


THREE 


LEAVE 


BREAK 


JAPAN 


OTHER 


DECKS 


SIGHT 


APPLY 


RIDGE 


DRIVE 


BLACK 


QUEEN 


BAKER 


DOCKS 


AWAIT 


EARLY 


SIEGE 


PROVE 


CHECK 


TAKEN 


LATER 


BANKS 


SPLIT 


ENEMY 


RANGE 


CURVE 


QUICK 


SEVEN 


METER 


TANKS 


LIMIT 


EVERY 


BARGE 


SEIZE 


TRUCK 


GIVEN 


PETER 


PLANS 


VISIT 


FERRY 


LARGE 


CHIEF 


CREEK 


ALIGN 


AFTER 


SHIPS 


AGENT 


FIFTY 


GAUGE 


STAFF 


FLANK 


AGAIN 


ENTER 


CORPS 


POINT 


PARTY 


STAKE 


PROOF 


CLERK 


PLAIN" 


RIVER 


FEARS 


FRONT 


FORTY 


SMOKE 


BEING 


LOCAL 


TRAIN 


COVER 


PAIRS 


COUNT 


SIXTY 


BROKE 


GOING 


VOCAL 


BEGIN 


THEIR 


HOURS 


DEPOT 


HEAVY 








SIX LETTER WORDS 








CANADA 


HALTED 


DEVICE 


CHARGE 


SEVERE 


ARRIVE 


TRENCH 


MANUAL 


ARABIA 


ROUTED 


NOVICE 


GEORGE 


RETIRE 


ACTIVE 


LAUNCH 


ANNUAL 


ALASKA 


LIQUID 


FIERCE 


REFUGE 


ENTIRE 


TWELVE 


SEARCH 


CASUAL 


PANAMA 


INLAND 


REDUCE 


MORALE 


BEFORE 


BREEZE 


CHURCH 


VISUAL 


METRIC 


ISLAND 


PARADE 


UNABLE 


SECURE 


RELIEF 


SWITCH 


CANCEL 


CRITIC 


DEFEND 


DECIDE 


CIRCLE 


ASSURE 


ZIGZAG 


THOUGH 


VESSEL 


BOMBED 


OFFEND 


DIVIDE 


SINGLE 


FUTURE 


RIDING 


FINISH 


DETAIL 


BARBED 


DEPEND 


DECODE 


MOBILE 


GREASE 


FILING 


EIGHTH 


REFILL 


RAIDED 


EXPEND 


ENCODE 


BEETLE ’ 


CHEESE 


LINING 


FOURTH 


ENROLL 


LANDED 


INTEND 


COFFEE 


BATTLE 


ADVISE 


MINING 


ATTACK 


SCHOOL 


WOODED 


EXTEND 


DECREE 


SETTLE 


DEVISE 


FIRING 


DEBARK 


PATROL 


^INDEED 


SECOND 


DEGREE 


LITTLE 


OPPOSE 


WIRING 


EMBARK 


PISTOL 


ALLIED 


BEYOND 


STRAFE 


NOZZLE 


COURSE 


DURING 


VERBAL 


SYSTEM 


KILLED 


GROUND 


ENGAGE 


MUZZLE 


REFUSE 


NOTING 


RADIAL 


VICTIM 


FORMED 


METHOD 


DAMAGE 


SCHEME 


LOCATE 


MOVING * 


SERIAL 


SIGCOM 


DOWNED 


PERIOD 


MANAGE 


RESUME 


EXCITE 


FLYING 


ANIMAL 


BOTTOM 


SCORED 


RECORD 


GARAGE 


ENGINE 


MINUTE 


BREACH 


FORMAL 


INFORM 


PASSED 


OFFICE 


BRIDGE 


RAVINE 


RESCUE 


DETACH 


NORMAL 


MEDIUM 


CAUSED 


POLICE 


ALLEGE 


EUROPE 


LEAGUE 


ATTACH 


SIGNAL 


SUDDEN 


UNITED 


ADVICE 


CHANGE 


SPHERE 


PURSUE 


BRANCH 


POSTAL 


SCREEN 



nEDTniGTE B 



3-12 




REF ID : A56895 



SIX LfeTTER WORDS-Contlnued 



SUNKEN 

BROKEN 

SEMEN 

HAPPEN 

BATTEN 

ELEVEN 

REMAIN 

ATTAIN 

WITHIN 

COLUMN 

RATION 

ACTION 

COMMON 

SUMMON 

POISON 

LESSON 

PONTON 

RETURN 

DRYRU^ 

TATTOO 

APPEAR 

DOLLAR 



MORTAR 

RUBBER 

MEMBER 

BOMBER 

NUMBER 

PINCER 

LEADER' 

LADDER 

MURDER 

PREFER 

SUFFER 

MEAGER 

HIGHER 

CIPHER 

EITHER 

TANKER 

HAMMER 

SUMMER 

BANNER 

MANNER 

GUNNER 



COVERED 
RETIRED 
ARMORED 
PRESSED 
CROSSED 
OMITTED 
DELAYED 
COMMAND 
COMMEND 
SUSPEND 
RESPOND 
BOMBARD 
AWKWARD 
FORWARD ‘ 
REPLACE 
'SERVICE 
ADVANCE 
ABSENCE 
ENFORCE 
BRIGADE 
GRENADE 
PRECEDE' 
OUTSIDE 
INCLUDE 
EXCLUDE 



RUNNER 

KEEPER 

HELPER 

PROPER 

NEARER 

ERASER 

CENTER 

BETTER 

LETTER 

BITTER 

LITTER 

AFFAIR 

REPAIR 

HARBOR 

TERROR 

MIRROR 

SECTOR 

VICTOR 

DOCTOR 

CANVAS 

PLACES 



FORCES 
BARGES 
BODIES 
ALLIES 
ARMIES 
TABLES 
PLANES 
PASSES 
LOSSES 
STATES 
ROUTES 
ISSUES 
CRISIS 
SHELLS 
, SPOOLS 
TRAINS 
SPOONS 
STRIPS 
TROOPS 
ORDERS 
OTHERS 



COLORS 
ACCESS 
EXCESS 
UNLESS 
STRESS 
ACROSS 
ASSETS 
VISITS 
, POINTS 
: STATUS 
1 ALWAYS 
"COMBAT 
' DEFEAT 
: THREAT 
DEFECT 
EFFECT 
; REJECT. 
.SELECT, 
! EXPECT 

diRect; 

1 STREET; 



TARGET 


CANNOT 


MONDAY 


PICKET 


ACCEPT 


SUNDAY 


ROCKET 


EXCEPT 


ANYWAY 


BILLET 


PROMPT 


REMEDY 


TURRET^ 


DEPART 


VALLEY 


, j sunset" 


DESERT 


PARLEY 


J WEIGHT 


.DIVERT 


CONVEY : 


FLIGHT 


ESCORT 


SURVEY 


SLIGHT 


/EFFORT 


VERIFY - 


■ Naught " 


/'REPORT 


SUPPLY ' ** 


FOUGHT 


* ARREST 


HOURLY '/ 


1 NOUGHT' 


/ RESIST 


DEPLOY' ' 


CREDIT./ 


ASSIST 


EMPLOY - 


'SUBMIT / 


• august 


CONVOY •„ 


1 COMMIT/ 


adjust 


OCCUPY . 


' SUMMIT 


DUGOUT 


SALARY 


RESULT 


OUTPUT 


ARMORY 


'1 ORIENT 


BUREAU 


NINETY 


• INTEkT 


REVIEW • 


EIGHTY 



EXTENT 

INVENT 



FOLLOW 

FRIDAY 



REFUGEE 

WINDAGE 

BAGGAGE 

"PACKAGE 

VILLAGE 

TONNAGE 

AVERAGE 

STORAGE 

BARRAGE 

PASSAGE 

MESSAGE 

COLLEGE 

ARRANGE 

WITHTHE 

THATTHE 

CHARLIE 

PRAIRIE 

VISIBLE 

BICYCLE 

'Hostile 

EXTREME 

CONFINE 

MACHINE 

ROUTINE 

Cyclone 



SEVEN LETTER WORDS - 

!E WARFARE PROMOTE 

iE DECLARE qOMMUTE 

E PREPARE REVENUE 

iE calibre Relieve 

IE MISFIRE RECEIVE. . 

iE inspire ' Passive 

E REQUIRE ‘ CjApTIVE 

E INQUIRE "REVOLVE 

iE ' LECTURE ' APPROVE 

E . ‘ RELEASE ~ OBSERVE 

iE DISEASE i RESERVE' 



SUNRISE 1 /ANALYZE 
LICENSE 7JUMPOFF 

Defense’ ' bombing 

OFFENSE 'PLACING ; 
PROPOSE f FORCING 
SUPPOSE/ ' -HEADING 
PURPOSE ' LEADING' 
REVERSE ' loading 

BECAUSE/ BEDDING ‘ 



MANDATE 

RADIATE 

OPERATE 

elevAte 

ENTENTE 



RAIDING 

HOLDING 

LANDING 

BINDING 

FINDING 



FORGING 
FISHING ’■ 
PUSHING ; 
NOTHING 

Talking 
sinking 
smoking . 

FALLING . 

Filling 

killings 

raining' 

MANNING' 

Running 

MORNING 

SLOPING 

MAPPING 

Searing 

GASSING 

'messing' 

MISSING 

LIFTING 

HALTING 

GETTING 

fitting’ 

. ISSUING 



TWENTY ■/ 
Thirty ‘ 



VARYING " 
ICEBERG ' v' 
DEBOUCH ' 
THROUGH 
- FURNISH 
TWELFTH- V 
SEVENTH '/ 
SETBACK // 
DERRICfc/ _ 
DETRUCK 
ENTRUCK 

Medical ' 
logical ■' 

CONCEAL// 
ILLEGAL.' , 

-Marshal “ 

INITIAL *’ 

: MARTIAL T" 

.FEDERAL' ’ 
.GENERAL 
SEVERAL 
CENTRAL' - 
. NATURAL^' ■ 
COASTAL 
GRADUAL 



REF ID : A56895 



SEVEN LETTER W0RB8-=edatlmied 



UNUSUAL 


INTRAIN 


ENVELOP, 


STARTER 


SUCCESS 


ASSAULT 


RAILWAY 


ARRIVAL 


CONTAIN 


SIMILAR 


QUARTER 


USELESS 


INSTANT 


SEGRSGY 


CHANNEL 


CAPTAIN 


REGULAR 


DELIVER 


ILLNESS 


ELEMENT' 


VACANCY 


COLONEL 


CONDIMN 


CALIBER 


RECOVER 


WITNESS 


COMMENT 


SIGNIFY 


00UN01L 


ABANDON , 


OCTOBER 


AVIATOR 


ADDRESS 


CURRENT 


SATISFY 


FUELOIL 


OPINION 


OFFICER 


TRAOTOR 


EXPRESS 


PRESENT 


RAPIDLY 


INSTALL 


SESSION 


POUNDER 


VISITOR 


DISMISS 


APPOINT 


QUICKLY 


DISTILL 


MISSION 


TRIOQER 


TAOTIOS 


DISCUSS 


RECEIPT 


NIGHTLY 


PAYROLL 


STATION 


WEATHER 


ISLANDS 


TARSITS 


ATTEMPT 


SHORTLY 


CONTROL 


SECTION 


WHITHER 


CHANGES 


SURPLUS 


SUPPORT 


COMPANY 


WILLIAM 


ECHELON 


ANOTHER 


ENEMIES 


RETREAT 


SUGGEST 


DESTROY 


DIAGRAM 


BALLOON 


•FARTHER 


BATTLES 


EXTRACT 


HIGHEST 


PRIMARY 


PROGRAM 


PLATOON 


FURTHER 


GLASSES 


CONTACT 


NEAREST ' 


SUMMARY 


MINIMUM 


LIAISON 


SOLDIER 


CHASSIS 


COLLECT 


PROTEST 


1 LIBRARY 


MAXIMUM 


HORIZON 


CARRIER 


ATTACKS 


RESPECT 


REQUEST 


JANUARY 


HASBEEN 


EASTERN 


COURIER 


VESSELS 


CORRECT 


AGAINST * 


BRIBERY 


FIFTEEN 


WESTERN 


HEAVIER 


PATROLS 


PROTECT 


OUTPOST 


BATTERY 


SIXTEEN 


FOGHORN 


TRAWLER 


BOMBERS 


INFLICT 


PROVOST 


INQUIRY 


BETWEEN 


UNKNOWN 


STEAMER 


NUMBERS 


CONDUCT 


BOYCOTT 


CAVALRY 


KITCHEN 


TOBACCO 


CLIPPER 


REPAIRS 


TONIGHT 


WITHOUT 


VICTORY 


WRITTEN 


TORPEDO 


CRUISER 


SAILORS ' 


CIRCUIT 


LOOKOUT 


EMBASSY 


EXPLAIN 


WARSHIP 


AMMETER 


SECTORS 


RECRUIT 


SIMPLEX 


UTILITY 


TERRAIN 


DEVELOP 


FIGHTER 


COMPASS 


PURSUIT 


TUESDAY ' 


SEVENTY 



DETRAIN 



EIGHT LETTER WORDS 



INSIGNIA 


EXPELLED 


DICTATED 


STANDARD 


LANGUAGE 


ENVELOPE 


OPPOSITE 


SPECIFIC 


ENROLLED 


EFFECTED 


OUTBOARD 


DISLODGE 


XNSEOURE 


CONTINUE 


TERRIFIC 


DISARMED 


INFECTED 


OUTGUARD 


EXCHANGE 


PRESSURE 


CRITIQUE 


ECONOMIC 


ASSIGNED 


REJECTED 


WINDWARD 


PROBABLE 


DECREASE 


THATHAVE 


MECHANIC 


RETURNED 


SELECTED 


EASTWARD 


SUITABLE 


EXERCISE 


DECISIVE 


ATLANTIC 


APPEARED 


BILLETED 


WESTWARD 


ELIGIBLE 


SURPRISE 


POSITIVE 


RAILHEAD 


DECLARED 


INVENTED 


DESCRIBE 


TERRIBLE 


SUSPENSE 


PRESERVE 


RAILROAD 


PREPARED 


. DEPARTED 


ORDNANCE 


POSSIBLE 


DISPERSE 


EQUALIZE 


REPLACED 


HINDERED 


DESERTED 


DISTANCE ' 


FLEXIBLE 


TRAVERSE 


MOBILIZE 


ADVANCED 


SUFFERED 


ESCORTED 


COMMENCE 


ASSEMBLE 


DEDICATE 


INVADING 


DEMANDED 


CENTERED 


DEPORTED 


SENTENCE 


OBSTACLE 


INDICATE 


DIVIDING 


EXPANDED 


BATTERED 


REPORTED 


ANNOUNCE 


ENCIRCLE 


INITIATE 


BUILDING 


DEFENDED 


LETTERED 


ARRESTED 


COMMERCE 


SCHEDULE 


ESTIMATE 


GUARDING 


OFFENDED 


REPAIRED 


ENLISTED 


ENFILADE 


. MARITIME 


ORDINATE 


ENGAGING 


EXPENDED 


REQUIRED 


SURVIVED 


CONCLUDE 


AIRDROME 


DETONATE 


DAMAGING 


EXTENDED ' 


RESTORED 


IMPROVED 


LATITUDE 


AIRPLANE 


SEPARATE 


MARCHING 


GROUNDED 


DEFERRED 


OBSERVED 


ALTITUDE 


JETPLANE 


EVACUATE 


BREAKING 


BESIEGED 


CAPTURED 


REVIEWED 


EMPLOYEE 


MEDICINE 


EXCAVATE 


FLANKING 


DETACHED 


REPULSED 


DEPLOYED 


CARRIAGE 


DOCTRINE 


OBSOLETE 


TOTALING 


FINISHED 


COMPOSED 


AIRFIELD 


FUSELAGE 


POSTPONE 


COMPLETE . 


SHELLING 


OCCUPIED 


MANDATED 


FOOTHOLD 


EQUIPAGE 


SEABORNE 


CONCRETE 


BATTLING 


ATTACKED 


DEFEATED 


THOUSAND 


FRONTAGE 


AIRBORNE 


EXPEDITE 


SWIMMING 


REPELLED 


REPEATED 


SURROUND 


SABOTAGE 


DEVELOPE 


DEFINITE 


TRAINING 



3-14 




REDTIUCTED 



REF ID: A5 68 95 



EIGHT LETTER WORDS— Continued 



PLANNING 


ELEVENTH 


CAMPAIGN 


PRISONER 


VEHICLES 


RESPECTS 


WITHDRAW 


SWEEPING 


ANTITANK 


CHAPLAIN 


IMPROPER 


MISFIRES 


ELEMENTS 


WITHDREW 


SHIPPING 


CODEBOOK 


MAINTAIN 


REPEATER 


DEFENSES 


ATTEMPTS 


TOMORROW 


GROUPING 


CHEMICAL 


MOUNTAIN 


DESERTER 


EXPENSES 


PROTESTS 


PARALLAX 


ENTERING 


CLERICAL 


BULLETIN 


DISASTER 


PURPOSES 


OUTPOSTS 


SATURDAY 


COVERING 


TACTICAL 


INVASION 


REGISTER 


RESERVES 


ENORMOUS 


THURSDAY 


RETIRING" 


CRITICAL 


DECISION 


CANISTER 


ANALYSIS 


LUMINOUS 


CAUSEWAY 


ADVISING 


NAUTICAL 


DIVISION 


RECEIVER 


BARRACKS,, 


RIGOROUS 


EFFICACY 


OPPOSING 


OFFICIAL 


LOCATION 


REVOLVER 


missions' , 


VIGOROUS 


IDENTIFY 


DRESSING 


MATERIAL 


AVIATION 


OBSERVER 


STATIONS 


CONTRACT 


STRATEGY 


PRESSING 


MEMORIAL 


CITATION 


MANEUVER 


FACTIONS 


. INDIRECT 


PROBABLY 


CROSSING 


NATIONAL 


TAXATION 


EMPLOYER 


PONTOONS 


CONFLICT 


ASSEMBLY 1 


DRIFTING 


INTERNAL 


JUNCTION 


HOWITZER 


WARSHIPS 


DISTRICT 


ACTUALLY 


FIGHTING 


CORPORAL 


IGNITION 


CORRIDOR 


OFFICERS 


INSTRUCT 


MONOPOLY 


SIGHTING 


HOSPITAL 


POSITION 


SUPERIOR 


SOLDIERS 


AIRCRAFT 


EASTERLY 


LIMITING 


APPROVAL 


FORENOON 


INTERIOR 


CARRIERS 


DAYLIGHT 


WESTERLY 


PAINTING 


MATERIEL 


SQUADRON 


EXTERIOR 


TRAILERS 


MIDNIGHT 


BOUNDARY 


PRINTING 


PARALLEL 


GARRISON 


OPERATOR 


TRAWLERS 


PROHIBIT 


MILITARY 


SPOTTING 


SENTINEL 


NORTHERN 


DICTATOR 


CRUISERS 


SERGEANT 


SANITARY 


DELAYING 


SEALEVEL 


SOUTHERN 


REJECTOR 


FIGHTERS 


DOMINANT 


FEBRUARY 


RALLYING 


PROTOCOL 


CIRCULAR 


DIRECTOR 


QUARTERS 


ADJUTANT 


CEMETERY 


CARRYING 


MERCIFUL 


DECEMBER 


DETECTOR 


CARELESS 


ADJACENT 


ADVISORY 


FERRYING 


TELEGRAM 


REMEMBER 


ASSOONAS 


WIRELESS 


INCIDENT 


INFANTRY 


APPROACH 


AMERICAN 


NOVEMBER 


POLITICS 


BUSINESS 


ARMAMENT 


CAPACITY 


ENTRENCH 


EUROPEAN 


DEFENDER 


COMMANDS 


DARKNESS 


MOVEMENT 


FATALITY 


INTRENCH 


CIVILIAN 


RECORDER 


ADVANCES 


CONGRESS 


REGIMENT 


CALAMITY 


RESEARCH 


HAVEBEEN 


ENGINEER 


BARRAGES 


PROGRESS 


APPARENT 


VICINITY 


DESPATCH 


NINETEEN 


TRANSFER 


MESSAGES 


FORTRESS 


PASSPORT 


PRIORITY 


DISPATCH 


EIGHTEEN 


DECIPHER 


REMEDIES 


DISTRESS 


INTEREST 


ACTIVITY 


SKIRMISH 

DIMINISH 


THIRTEEN 

FOURTEEN 


ENCIPHER 


SUPPLIES 


REDCROSS 


REENLIST 


CASUALTY 



NINE LETTER WORDS 



MEMORANDA 


CANCELLED 


IMPRESSED 


ATTEMPTED 


ASSURANCE 


AERODROME 


STRATEGIC 


COMPELLED 


DISCUSSED 


PROTESTED 


ALLOWANCE 


HURRICANE 


AUTOMATIC 


DETRAINED 


INDICATED 


REQUESTED 


INCIDENCE 


AEROPLANE 


PATRIOTIC 


-ENTRAINED 


POPULATED 


SUBMITTED 


REFERENCE 


• INTERVENE 


BALLISTIC 


CONDEMNED 


ESTIMATED 


CONTINUED 


INFLUENCE 


FRONTLINE 


BEACHHEAD 


ECHELONED 


DOMINATED 


DESTROYED 


REENFORCE 


DETERMINE 


SPEARHEAD 


DEVELOPED 


DETONATED 


MOTORIZED 


REINFORCE 


TELEPHONE 


DESCRIBED 


CONQUERED 


SUSPECTED 


SEMIRIGID 


LONGITUDE 


INTERFERE 


ANNOUNCED 


PREFERRED 


CORRECTED 


RECOMMEND 


COMMITTEE 


ELSEWHERE 


BLOCKADED 


CONFERRED 


PROTECTED 


REARGUARD 


ADVANTAGE 


SHELLFIRE 


SUCCEEDED 


DECREASED 


INFLICTED 


NORTHWARD 


CARTRIDGE 


THEREFORE 


PROCEEDED 


INCREASED* 


COMPLETED 


SOUTHWARD 


CHALLENGE 


PROCEDURE 


COMMANDED 


CONDENSED 


INHABITED 


AMBULANCE 


AVAILABLE 


PREMATURE 


SUSPENDED 


COLLAPSED 


EXHIBITED 


DOMINANCE 


UNTENABLE 


DEPARTURE 


BOMBARDED 


DISPERSED 


ASSAULTED 


CLEARANCE 


DIRIGIBLE 


NAVALBASE 


FORTIFIED 


ADDRESSED 


APPOINTED 


ENDURANCE 


PRINCIPLE 


MANGANESE 



REPTRICTED 



3-15 



R ESTRICTED 



REF ID: A56895 



NINE LETTER WORDS— Continued 



CRITICISE 


REGARDING 


PERSONNEL 


INVENTION 


CONTINUES ' 


STATEMENT 


INTERPOSE 


ACCORDING 


CABLEGRAM 


PROMOTION 


BUILDINGS 


EQUIPMENT 


ASSOCIATE 


INCLUDING 


RADIOGRAM 


SEMICOLON 


OFFICIALS 


GROUPMENT 


IMMEDIATE 


LAUNCHING 


FIREALARM 


AFTERNOON 


REPRISALS 


INTERMENT 


OSCILLATE 


ATTACKING 


CRITICISM 


DISAPPEAR 


PROPOSALS 


• ALLOTMENT 


CIRCULATE 


DEBARKING 


MECHANISM 


IRREGULAR 


CIVILIANS 


PERMANENT 


DESIGNATE 


REFILLING 


DIETITIAN 


SEPTEMBER 


CAMPAIGNS 


DIFFERENT 


ALTERNATE 


SCREENING 


SEVENTEEN 


COMMANDER 


MAINTAINS 


REPRESENT 


COOPERATE 


REMAINING 


SUSPICION 


SURRENDER 


DIVISIONS 


RESTRAINT 


ELABORATE 


OBTAINING 


BATTALION 


REMAINDER 


MUNITIONS 


INTERCEPT 


PENETRATE 


INCLINING 


REBELLION 


PASSENGER 


POSITIONS 


INTERRUPT 


REINSTATE 


BEGINNING 


COLLISION 


MESSENGER 


ENGINEERS 


TRANSPORT 


CIGARETTE 


RETURNING 


PROVISION 


BRIGADIER 


PRISONERS 


NORTHEAST 


PARACHUTE 


PREPARING 


EXPANSION 


STRAGGLER 


READINESS 


SOUTHEAST 


DESTITUTE 


NUMBERING 


ASCENSION 


NEWSPAPER 


CONFLICTS 


NORTHWEST 


TECHNIQUE 


CENTERING 


DIMENSION 


CHARACTER 


DISTRICTS ‘ 


SOUTHWEST 


EXPANSIVE 


REQUIRING 


EXTENSION 


KILOMETER 


INCIDENTS 


INTERVIEW 


DEFENSIVE 


OPERATING 


EXPLOSION 


BAROMETER 


MOVEMENTS 


YESTERDAY 


OFFENSIVE 


ENLISTING 


ADMISSION 


GYROMETER 


OUTSKIRTS 


WEDNESDAY 


EXPENSIVE 


RECEIVING 


EXCLUSION 


DESTROYER 


ANONYMOUS- 


EMERGENCY 


INTENSIVE 


REVIEWING 


RADIATION 


PROJECTOR 


APPARATUS 


NORTHERLY 


EXTENSIVE 


EMPLOYING 


VARIATION 


PROTECTOR 


DISINFECT 


SERIOUSLY 


EXPLOSIVE 


OCCUPYING 


INFLATION 


CHAUFFEUR 


INTERDICT 


INSTANTLY 


EXCESSIVE 


PARAGRAPH 


FORMATION 


LOGISTICS 


DIFFICULT 


ACCOMPANY 


INCLUSIVE 


ESTABLISH 


OPERATION 


STANDARDS 


COMBATANT 


ARBITRARY 


EXCLUSIVE 


TWENTIETH 


SITUATION 


RESOURCES 


IMPORTANT 


NECESSARY 


TENTATIVE 


FIFTEENTH 


ELEVATION 


COMPANIES 


ASSISTANT . 


SECRETARY 


DEFECTIVE 


SIXTEENTH 


OBJECTION 


BATTERIES 


CONFIDENT 


ARTILLERY 


EFFECTIVE 


waTertank 


DIRECTION 


EMBASSIES 


PRESIDENT 


ACCESSORY 


OBJECTIVE 


• TECHNICAL 


CONDITION 


AIRDROMES 


DEPENDENT 


TERRITORY 


INCENTIVE 


CHRONICAL 


COALITION 


SEAPLANES 


NEGLIGENT 


LIABILITY 


EXECUTIVE 


PRACTICAL 


PARTITION 


AIRPLANES 


DEFICIENT 


HOSTILITY 


RECOGNIZE 


POLITICAL 


DETENTION 


EXERCISES 


EFFICIENT 


PROXIMITY 


SERVICING 


IDENTICAL 


RETENTION 


WITNESSES 


PLACEMENT 


INDEMNITY 


ADVANCING 


PRINCIPAL 


INTENTION 


ADDRESSES 


AGREEMENT 


INTEGRITY 


PRECEDING 


DISMISSAL 


ATTENTION 


ESTIMATES 


AMUSEMENT 


NECESSITY 


EXTENDING 


CONTINUAL 






’ • 





^TEN LETTER WORDS 



ATOMICBOMB 


APPROACHED 


COMPRESSED 


UNDERSTOOD 


.CONFIDENCE 


GEOGRAPHIC 


ENTRENCHED 


. DISTRESSED 


COASTGUARD 


NEGLIGENCE 


GYROSCOPIC 


DESPATCHED 


DESIGNATED 


POSTOFFiqE 


EXPERIENCE 


DIPLOMATIC 


DISPATCHED 


RESTRICTED 


ACCORDANCE' 


PREFERENCE 


BRIDGEHEAD 


THREATENED 


INSTRUCTED 


ALLEGIANCE 


DIFFERENCE 


‘ PRESCRIBED 


MAINTAINED 


PROHIBITED 


APPEARANCE . 


' CONFERENCE 


REENFORCED 


DETERMINED 


REENLISTED 


ACCEPTANCE 


CAMOUFLAGE 


REINFORCED 


ONEHUNDRED 


MECHANIZED 


RESISTANCE 


DEPENDABLE 


BEENNEEDED 


DECIPHERED , 


CONTRABAND 


ASSISTANCE 


EXPENDABLE 


UNEXPENDED 


ENCIPHERED 


UNDERSTAND 


PRECEDENCE 


UNSUITABLE 


RESTRICTED 




3-16 ■ 








REF ID: A5 68 95 



REOTRIGTE& 



TEN LETTER WORDS— Continued 



ACCEPTABLE 


EVACUATING 


ALLOCATION 


GONIOMETER 


CONTINGENT 


IMPASSIBLE 


COLLECTING 


FOUNDATION 


HYDROMETER 


SUFFICIENT 


IMPOSSIBLE 


CONNECTING 


RECREATION 


HYGROMETER 


CONVENIENT 


ASPOSSIBLE 


INFLICTING 


IRRIGATION 


AMBASSADOR 


EQUIVALENT 


RECEPTACLE 


EXPEDITING 


NAVIGATION 


INSTRUCTOR 


ENGAGEMENT 


MOTORCYCLE 


RECRUITING 


REGULATION ' 


BALLISTICS 


MANAGEMENT 


AUTOMOBILE 


ATTEMPTING 


POPULATION 


STATISTICS 


EXCITEMENT 


DISCIPLINE 


SUPPORTING 


ESTIMATION 


CROSSROADS 


DETACHMENT 


QUARANTINE 


EXTINGUISH 


DOMINATION ; 


DESPATCHES 


ATTACHMENT 


ENTERPRISE 


NINETEENTH 


DETONATION ‘ 


DISPATCHES 


EXPERIMENT 


TRANSVERSE 


EIGHTEENTH 


OCCUPATION , 


ASSEMBLIES 


ENROLLMENT 


COORDINATE 


THIRTEENTH 


SEPARATION 


FACILITIES 


ASSIGNMENT. 


ILLUMINATE 


FOURTEENTH 


DECORATION 


ACTIVITIES 


ATTAINMENT 


ANTICIPATE 


WILLATTACK 


LIMITATION 1 


CASUALTIES 


INTERNMENT 


ILLITERATE 


ARTIFICIAL 


SANITATION 


FRONTLINES 


GOVERNMENT 


ILLUSTRATE 


CREDENTIAL 


INVITATION 


SUBMARINES 


ASSESSMENT 


COMPENSATE 


ADDITIONAL 


EVACUATION 


OBJECTIVES 


COMMITMENT 


DISTRIBUTE 


ACCIDENTAL 


EVALUATION 


ENEMYTANKS 


DEPARTMENT 


SUBSTITUTE 


REGIMENTAL 


EXCAVATION ' 


SUSPICIONS 


ENLISTMENT 


CONSTITUTE 


INDIVIDUAL 


COLLECTION 


COLLISIONS 


INSTRUMENT 


COMMUNIQUE ' 


WITHDRAWAL 


CONNECTION 


PROVISIONS 


DEPLOYMENT 


TWENTYFIVE 


AIRCONTROL 


* INSPECTION 


EXPLOSIONS 


EMPLOYMENT 


SUCCESSIVE 


SUCCESSFUL 


CORRECTION 


FORMATIONS 


PERSISTENT 


IMPRESSIVE 


RESPECTFUL 


PROTECTION’ 


OPERATIONS 


AIRSUPPORT 


LOCOMOTIVE 


MEMORANDUM 


EXHIBITION 


DIRECTIONS 


CONSPIRACY 


CENTRALIZE 


SUSPENSION 


EXPEDITION 


CONDITIONS 


DEFICIENCY 


NATURALIZE 


DISPERSION 


DEFINITION 


TROOPSHIPS 


EFFICIENCY 


DEMOBILIZE 


CONCESSION 


AMMUNITION 


NEWSPAPERS 


COMPLETELY 


COMMANDING 


CONFESSION 


OPPOSITION ' 


' KILOMETERS 


APPARENTLY 


DEBOUCHING 


DEPRESSION 


PROPORTION 


DESTROYERS 


INCENDIARY 


DETRUCKING 


IMPRESSION 


REVOLUTION 


TRANSPORTS 


COMMISSARY 


ENTRUCKING 


POSSESSION 


MACHINEGUN 


SUSPICIOUS 


ELEMENTARY 


ENCIRCLING 


SUBMISSION 


BATTLESHIP 


VICTORIOUS 


LABORATORY 


SIGNALLING 


COMMISSION 


CENSORSHIP 


CIRCUITOUS 


TRAJECTORY 


PATROLLING 


PERMISSION 


ARMOREDCAR 


CONTINUOUS 


CAPABILITY 


OVERCOMING 


DISCUSSION 


DIVEBOMBER 


PHOSPHORUS 


AUDIBILITY 


DETRAINING 


CONCLUSION 


COMMANDEER 


FLASHLIGHT 


VISIBILITY 


CONCERNING 


DEDICATION 


DISPATCHER 


COMMANDANT 


SIMILARITY 


INDICATING 


INDICATION 


MILLIMETER 


LIEUTENANT 


INSECURITY 


ANTEDATING 




- 










ELEVEN LETTER WORDS 






IMPEDIMENTA 


SURRENDERED 


CONSTITUTED 


INFLAMMABLE 


CERTIFICATE 


. TOPOGRAPHIC 


ENCOUNTERED 


BATTLEFIELD 


RESPONSIBLE 


COMMUNICATE 


' RECOMMENDED 


TRANSFERRED 


PERFORMANCE 


NAVALBATTLE 


INVESTIGATE 


PREARRANGED 


DISINFECTED 


MAINTENANCE 


TEMPERATURE 


APPROPRIATE 


ESTABLISHED 


REAPPOINTED 


COINCIDENCE 


MANUFACTURE 


APPROXIMATE 


OVERWHELMED 


INTERCEPTED 


SUBSISTENCE 


schoolhduSe 


EXTERMINATE 


DISAPPEARED 


INTERRUPTED 


CATASTROPHE 


CUSTOMHOUSE 


DETERIORATE 



RESTRICTED 3-17 




ftjgflTRICTED 



REF ID : A568 95 



CONCENTRATE 

DEMONSTRATE 

NECESSITATE 

DISCONTINUE 

SEVENTYFIVE 

PROGRESSIVE 

RETROACTIVE 

DESCRIPTIVE 

SYNCHRONIZE 

APPROACHING 

INTERVENING 

ENGINEERING 

INTERFERING 

ALTERNATING 

INTERESTING 

WITHDRAWING 

DISTINGUISH 

SEVENTEENTH 

NAVALATTACK 

STRATEGICAL 

TRADITIONAL 

CONTINENTAL 

FIRECONTROL 

NATIONALISM 



TRANSPACIFIC 

HYDROGRAPHIC 

UNIDENTIFIED 

COMMISSIONED 

DISSEMINATED 

CONCENTRATED 

DEMONSTRATED 

DISORGANIZED 

SIGNIFICANCE 

INTELLIGENCE 

INTERFERENCE 

INCOMPETENCE 

CONSIDERABLE 

FIGHTERPLANE 

INTERMEDIATE 

DECENTRALIZE 

GENERALSTAFF 

TRANSFERRING 

ENTERPRISING 

ILLUMINATING 

DISTRIBUTING 



-nEOTniCTEDT 



ELEVEN LETTER WORDS— Continued 



SMOKESCREEN 
APPLICATION 
ASSOCIATION 
RETALIATION 
DEBARKATION 
EMBARKATION 
LEGISLATION 
CIRCULATION 
INFORMATION 
EXPLANATION 
DESIGNATION 
RESIGNATION 
EXAMINATION 
PREPARATION 
' COOPERATION 
IMMIGRATION 
INSPIRATION 
CORPORATION 
PENETRATION 
ARBITRATION 
COMPUTATION 
OBSERVATION 
RESERVATION 
RESTRICTION 



DISTINCTION 

DESTRUCTION 

INSTRUCTION 

RECOGNITION 

REQUISITION 

COMPOSITION 

DISPOSITION 

COMPETITION 

DESCRIPTION 

CONSUMPTION 

INSTITUTION 

LIGHTBOMBER 

HEAVYBOMBER 

RANGEFINDER 

DYNAMOMETER 

THERMOMETER 

INTERPRETER 

RECONNOITER 

BLOCKBUSTER 

AERONAUTICS 

NAVALFORCES 

ACCESSORIES 

HOSTILITIES 

ENEMYPLANES 



PHILIPPINES 

PARENTHESES 

HEAVYLOSSES 

COMMUNIQUES 

PARENTHESIS 

CREDENTIALS 

BATTLESHIPS 

ARMOREDCARS 

CORRECTNESS 

ENGAGEMENTS 

ASSIGNMENTS 

ASSESSMENTS 

INSTRUMENTS 

INTERCERPTS 

ESTIMATEDAT 

SIGNIFICANT 

INDEPENDENT 

INTELLIGENT 

COEFFICIENT 

BOMBARDMENT 

REPLACEMENT 

EMPLACEMENT 

ENFORCEMENT 

ARRANGEMENT 



TWELVE LETTER WORDS 



CONSTITUTING 

BREAKTHROUGH 

GEOGRAPHICAL 

CONFIDENTIAL 

PRESIDENTIAL 

RECREATIONAL 

AGRICULTURAL 

DEPARTMENTAL 

UNSUCCESSFUL 

GENERALALARM 

VETERINARIAN 

TRANSMISSION 

VERIFICATION 

CONFISCATION 

COMMENDATION 

CONCILIATION 

CANCELLATION 

PROCLAMATION 

CONFIRMATION 

CONFORMATION 

COORDINATION 



ILLUMINATION 

ANTICIPATION 

REGISTRATION 

ILLUSTRATION 

INAUGURATION 

COMPENSATION 

CONVERSATION 

RADIOSTATION 

CONTINUATION 

PRESERVATION 

MOBILIZATION 

ORGANIZATION 

INTERDICTION 

ROADJUNCTION 

INTRODUCTION 

CONSTRUCTION 

INTERVENTION 

CONSCRIPTION 

INTERRUPTION 

DISTRIBUTION 

SUBSTITUTION 



CONSTITUTION 

NORTHWESTERN 

SOUTHWESTERN 

Marksmanship 

MEDIUMBOMBER 

COMMISSIONER 

PSYCHROMETER 

SHARPSHOOTER 

DIFFICULTIES 

UNITEDSTATES 

PREPARATIONS 

OBSTRUCTIONS 

INSTRUCTIONS 

LIGHTBOMBERS 

HEAVYBOMBERS 

HEADQUARTERS 

PREPAREDNESS 

COMPLETENESS 

CARELESSNESS 

SEARCHLIGHTS 

REPLACEMENTS 



3-18 



CONFINEMENT 

REQUIREMENT 

MEASUREMENT 

IMPROVEMENT 

CONCEALMENT 

ECHELONMENT 

DEVELOPMENT 

APPOINTMENT 

COMPARTMENT 

BELLIGERENT 

INCOMPETENT 

FINGERPRINT 

DISCREPANCY 

PHOTOGRAPHY 

IMMEDIATELY 

EXTENSIVELY 

EFFECTIVELY 

PRELIMINARY 

CONTROVERSY 

ELECTRICITY 

NATIONALITY 

SUITABILITY 

SUPERIORITY 



EMPLACEMENTS 

MEASUREMENTS 

ADVANTAGEOUS 

SIMULTANEOUS 

ANTIAIRCRAFT 

NONCOMBATANT 

CONVALESCENT 

DISPLACEMENT 

COMMENCEMENT 

ANNOUNCEMENT 

ENTANGLEMENT 

DECIPHERMENT 

ENCIPHERMENT 

REENLISTMENT 

INEFFICIENCY 

SUCCESSFULLY 

RESPECTFULLY 

SATISFACTORY 

INTRODUCTORY 

IRREGULARITY 




REF ID : A56895 



RESTRICTED 



TRANSATLANTIC 

DISTINGUISHED 

DECENTRALIZED 

DISAPPEARANCE 

IMPRACTICABLE 

INDETERMINATE 

CORRESPONDING 

CONCENTRATING 

COUNTERATTACK 



CHARACTERISTIC 

RECONNAISSANCE 

DISCONTINUANCE 

CORRESPONDENCE 

ADMINISTRATIVE 

REPRESENTATIVE 

DISTINGUISHING 



RESTRICTED 



THIRTEEN LETTER WORDS 



CHRONOLOGICAL 

CONGRESSIONAL 

INTERNATIONAL 

SPECIFICATION 

QUALIFICATION 

COMMUNICATION 

ACCOMMODATION 

INVESTIGATION 

DISSEMINATION 



DETERMINATION 

EXTERMINATION 

CONSIDERATION 

CONCENTRATION 

DEMONSTRATION 

QUARTERMASTER 

CIRCUMSTANCES 

DISCREPANCIES 

PRELIMINARIES 



FIGHTERPLANES 

INSTALLATIONS 

MEDIUMBOMBERS 

MISCELLANEOUS 

INSTANTANEOUS 

REENFORCEMENT 

REINFORCEMENT 

REIMBURSEMENT 

REINSTATEMENT 



FOURTEEN LETTER WORDS 



RECONNOITERING 

METEOROLOGICAL 

CIRCUMSTANTIAL 

CLASSIFICATION 

IDENTIFICATION 

RECOMMENDATION 



ADMINISTRATION 

INTERPRETATION 

TRANSPORTATION 

CENTRALIZATION 

NATURALIZATION 

DEMOBILIZATION 



I 



3-19 



ESTABLISHMENT 

ENTERTAINMENT 

REAPPOINTMENT 

WARDEPARTMENT 

APPROXIMATELY 

EXTRAORDINARY 

REVOLUTIONARY 

DEPENDABILITY 



REORGANIZATION ' - 

RECONSTRUCTION 

IRREGULARITIES 

INVESTIGATIONS 

SATISFACTORILY 

RESPONSIBILITY 




RESTRICTED 



REF ID: A56895 



C. LIST OF WORDS USED IN MILITARY TEXT ARRANGED ALPHABETICALLY 

ACCORDING TO WORD PATTERN 



PATTERN AA 



A 


CC 


EPT 


FA 


LL 


9 


MA 


NN 


ER 


A 


CC 


ORDING 


FE 


LL 




A 


NN 


EX 


0 


CC 


UPY 


FU 


LL 




CA 


NN 


OT 


A 


DD 




HI 


LL 




T' 


00 




SU 


DD 


EN 


I 


LL 




W 


00 


DS 


LA 


DD 


ER ■ 


INSTA 


LL 




PR 


00 


F ' 


BE 


DD 


ING 


PAYRO 


LL 




B 


00 


K 


FL 


EE 




REFI 


LL 




■ n 


00' 


K 


S 


EE 




SHE 


LL 




H 


00 


K 


THR 


EE 




. SMA 


LL 




L 


00 


K 


PROC 


EE 


D 


SPE 


LL 




T 


00 


K 


SP 


EE 


D 


WE 


LL 




SCH 


00 


L 


CR 


EE 


K 


WI 


LL 




T 


00 


L 


W 


EE 


K 


VI 


LL 


AGE 


PLAT 


00 


N 


F 


EE 


L 


CO 


LL 


APSED 


S 


00 


N 


ST 


EE 


L 


DO 


LL 


AR 


TR 


00 


PS 


WH 


EE 


L 


OSCI 


LL 


ATE 


C 


00 


RDINAT] 


B 


EE 


N 


'KI 


LL 


ED 


B 


00 . 


TH 


FOURT 


EE 


N 


BI 


LL 


ET 


STO 


pp 


ED 


HASB 


EE 


N 


BU 


LL 


ETIN 


HA 


pp 


EN 


QU 


EE 


N 


V A 


LL 


EY 


CLI 


pp 


ER 


SCR 


EE 


N 


A 


LL 


IED 


MA 


pp 


ING 


S 


EE 


N 


• A 


LL 


IES 


A 


pp 


LY 


SIXT 


EE 


N 


FA 


LL 


ING 


SU 


pp 


LY 


R 


EE 


NLIST 


PATRO 


LL 


ING 


A 


pp 


OINT 


K 


EE 


P 


SHE 


LL 


ING 


A 


pp 


OINTED 


sw 


EE 


PING 


A 


LL 


OW 


SU 


pp 


ORT 


F 


EE 


T 


A 


LL 


Y 


SU 


pp 


ORTING 


FL 


EE 


T 


RA 


LL 


Y 


A 


pp 


ROVE 


M 


EE 


T 


•CO 


MM 


A 


TE 


RR 


AIN 


JUMPO 


FF 




CO 


MM 


AND 


CU 


RR 


ENT 


0 


FF 




CO 


MM 


ANDER 


A 


RR 


,EST 


STA 


FF 




SU 


MM 


ARY 


HU 


RR 


I CANE 


0 


FF 


END 


CO 


MM 


END^ 


DE 


RR 


ICK 


SU 


FF 


ER 


CO 


MM 


ENTf 


GA 


RR 


ISON. 


TRA 


FF 


IC 


HA 


MM 


ER 


A 


RR 


IVE 


0 


FF 


ICE 


SU 


MM 


ER 


CA 


RR 


Y 


0 


FF 


ICER 


CO 


MM 


IT 


FE 


RR 


Y 


E 


FF 


ORT 


SU 


MM 


IT 


ACRO 


SS 




FO 


GG 


Y 


SU 


MM 


ON 


COMPA 


SS 




A 


LL 




CO 


MM 


UTE. 


CONGRE 


SS 




CA 


LL 




TO 


NN 


AG# 


CRO 


SS 




CE 


LL 




CHA 


NN 


EL 


DARKNE 


SS 




DRI 


LL 




BA 


NN 


ER 


DRE 


SS 




ENRO 


LL 




GU 


NN 


ERi 


LE 


SS 





RESTRICTED 



3-20 




REF ID: A5 68 95 



JREOTJRICTE B 



PATTERN AA— Continued 



LO 


SS 




A 


SS 


IGNED 


BA 


TT 


EN 


MA 


ss 




CRO 


SS 


ING 


WRI 


TT 


EN 


ME 


SS 




DRE 


SS 


ING 


BI 


TT 


ER 


PA 


ss 




‘ ME 


SS 


ING' 


LI 


TT 


ER 


PRE 


ss 




PA 


SS 


IVE 


BA 


TT 


ERY 


UNLE 


ss 




EE 


SS 


ON . . 


SPO 


TT 


ING 


WTTNE 


ss 




I 


SS 


UE 


BA 


TT 


LE 


PA 


ss 


ED 


A 


SS 


URE 


BA 


TT 


LESHIP 


A 


ss 


EMBLY 


EMBA 


SS 


Y 


MU 


ZZ 


LE 


A 


ss 


ET 


OMI 


TT 


ED 


NO 


zz 


LE 


PO 


ss 


IBLE 


SUBMI 


TT 


ED 









MISCELLANEOUS PATTERNS 



AABA 


AGR EEME NT 


AABCB 




SU FFICI ENT 


AABA 


K EEPE R 


AABCB 




A LLEGE 


AABA 


CH EESE 


AABCB 




CO LLEGE 


AABA 


BR EEZE 


AABCB 




BI LLETE D 


AABA 


MA NNIN G 


AABCB 




A MMETE R 


AABA 


PLA NNIN G 


AABCB 




W OODED 


AABA 1 


RU NNIN G 


AABCB 




TE RRIFI C 


AABA 


L OOKO UT 


AABCB 




BA TTERE D 


AABA 


E RROR 


AABCBDEB 




DI FFERENCE 


AABA 


MI RROR 


AABCC 




A CCESS 


AABA 


TE RROR 


AABCC 




A CCESS ORY 


AABA 


GLA SSES 


AABCC 




. CO MMISS ARY 


AABA 


LO SSES 


AABCCB 




WI LLATTA CK 


AABA 


PA SSES 


AABCCDD 




CO MMITTEE 


AABA 


CHA SSIS 


AABCCDEFBC 




A CCESSORIES 


AABA 


A SSIS T 


AABCDA 




I LLEGAL 


AABAACB 


A SSESSME NT 


AABCDA 




A TTEMPT 


AABAACBDEA 


A SSESSMENTS 


^ABCDAB 




A TTEMPTE D 


AABAB 


PROC EEDED 


4ABCDB 




0 FFENSE 


AABB 


CO FFEE 


AABCDB 




CHA LLENGE 


AABB 


BA LLOO N 


AABCDB 1 


\ 


BA LLISTI C 


AABBAACAC 


B EENNEEDED 


AABCDB 




A RRESTE D 


AABBCBC 


SU CCEEDED 


AABCDB 




PA SSENGE R 


AABCA 


B EETLE 


AABCDB 




BA TTERIE S 


AABCA 


A NNOUN CE 


AABCDB A 




SU RRENDER 


AABCA 


F OOTHO LD 


AABCDBABD 




SU RRENDERED 


AABCA 


CA RRIER 


AABCDBC 




CO MMANDAN T 


AABCA 


A SSETS 


AABCDBD 




0 FFENDED 


AABCA 


I SSUES 


AABCDBEC 




BA LLISTICS 


AABCADEC 


GQ MMITMENT 


a! abcdc 




E FFICAC Y 


AABCADEC 


' A TTENTION 


aiabcdd 




A DDRESS 


AABCADEFEA 


A NNOUNCEMEN T 


aabcdd 




I LLNESS 


AABCB 


SQ$ BENIN G 


a'abcddca 




A DDRESSED 


AABCB 


SU FFERE D 


a'abcddcd 




A DDRESSES 


AABCB 


DI FFERE NT 


AjABCDEB 




CO MMUNIQU E 


AABCB 


0 FFICI AL . 


AABCDEB 




TR OOPSHIP 






JL 


* 









/ 

. REF ID: A5 68 95 

RESTRICTED 



MISCELLANEOUS PATTERNS— Continued 



AABCDEB 


A 


SSEMBLE 


ABA 


INVA 


DED 




AABCDEBC 


TR 


OOPSHIPS 


ABA 


LAN 


DED 




AABCDEC 


CO 


MMANDIN C- 


ABA 


RAI 


DED 




AABCDECB 


BA 


TTLEFIEL D 


ABA 


WOUN 


DED 




AABCDED 


CO 


MMANDED 


ABA 




DID 




AABCDEDFd 


A 


MMUNITION 


ABA 


IC 


EBE- 


RG 


AABCDEE 


CO 


MMANDEE R 


ABA 


PR 


ECE 


DING 


AABCDEFA 


R 


EENLISTE D 


ABA 


R 


ECE 


IPT . 


AABCDEFA 


I 


RREGULAR 


ABA 


CR 


EDE 


NTIAL 


AABCDEFB 


0 


FFENSIVE 


ABA 


F 


EDE 


RAL 


AABCDEFBA 


A 


SSEMBLIES 


. ABA 


D 


EFE 


AT 


AABCDEFC 


A 


LLOTMENT 


ABA 


D 


EFE 


CT 


AABCDEFC 


C 


OOPERATE 


ABA 


D 


EFE 


R 


AABCDEFD 


I 


LLUSTRAT E 


ABA 


SI 


EGE 




AABCDEFD 


A 


SSIGNMEN T 


ABA 


R 


EJE 


CT 


AABCDEFDGA 


A 


SSIGNMENTS 


ABA 


S 


ELE 


CT 


AABCDEFGA • 


C 


OOPERATIO N 


ABA 


T 


ELE 


GRAM 


AABCDEFGABF 


R 


EENLISTMENT 


ABA 




ELE 


VATION 


AABCDEFGD 


BA 


TTLESHIPS 


ABA 


SCH 


EME 




AABCDEFGDAE 


C 


OORDINATION 


ABA 


R 


EME 


DY 


AABCDEFGDE 


A 


PPOINTMENT 


ABA 


DISPLAC 


EME 


NT 


ABA 




AGA IN 


ABA 


PLAC 


EME 


NT 


ABA 




AGA INST 


ABA 




ENE 


MY 


ABA 


C 


ALA MITY 


ABA 


G 


ENE 


RAL 


ABA 




ALA RM 


ABA 


R 


EPE 


L 


ABA 


S 


ALA RY 


ABA 


H 


ERE 




ABA 


D 


AMA GE 


ABA 


SPH 


ERE 




ABA 


M 


ANA GE 


ABA 


TH 


ERE 




ABA 


C 


ANA L 


ABA 


W 


ERE 




ABA 




ANA LYZE 


ABA 


WH 


ERE 




ABA 


J 


APA N 


ABA 


CONQU 


ERE 


D 


ABA 


P 


ARA CHUTE 


ABA 


COV 


ERE 


D ' 


ABA 


P 


ARA DE 


ABA 


TH 


ESE 




ABA 


SEP 


ARA TION 


ABA 


PR 


ESE 


NT 


ABA 


F 


ATA L 


ABA 


D 


ESE 


RT 


ABA 


N 


AVA L 


ABA 


COMPL 


ETE 




ABA' 


N 


AVA LFORCES 


ABA 


KILOM' 


‘ETE 


R 


ABA 


. C 


AVA LRY 


ABA 


M 


ETE 


R 


ABA 


EXC 


AVA TION 


ABA 


P 


ETE 


R 


ABA 




AWA IT 


ABA 


D 


EVE 


LOP 


ABA 




AWA RD 


ABA 


S 


EVE 


N 


ABA 




AWA Y 


ABA 


S 


EVE 


NTH 


ABA 


PRO 


BAB LE 


ABA 


S 


EVE 


NTY 


ABA 


PRO 


BAB LY 


ABA 


S 


EVE 


RAL 


ABA 


BI 


CYC LE 


ABA 




EVE 


RY 


ABA 




CYC LONE 


ABA 




EYE 




ABA 


BLOCKA 


DED 


ABA 




FIF 


TH 


ABA 


GROUN 


DED 


ABA 




FIF 


TY 


ABA 


GUAR 


DED 


ABA 


EIG 


HTH 





REDTRICTE B 3-22 




REF ID: A56895 



M ISCELL ANEOUS PATTERNS— Continued 



ABA 


L IAI SON 


ABA 


CA RTR IDGE 


ABA 


PROH IBI T ' 


ABA ' 


D RYR UN 


ABA 


SERV, ICI NG 


ABA 


DI SAS TER 


ABA 


RA IDI NG 


ABA 


CA SES 


ABA 


R IDI NG 


ABA 


RE SIS T 


ABA 


R IGI D 


ABA 


' SUS PEND 


ABA 


F ILI NG 


ABA 


SYS TEM 


ABA 


M ILI TARY 


ABA 


S TAT ION 


ABA 


MOB ILI ZE 


ABA 


DIC TAT OR 


ABA 


S IMI LAR 


ABA 


TIT LE 


ABA 


L IMI T 


ABA 


AL TIT UDE 


ABA 


PROX IMI TY 


ABA 


LA TIT UDE 


ABA 


F INI SH 


ABA 


TOT AL 


ABA 


F IRI NG 


ABA 


TOT ALING 


ABA 


RET IRI NG 


ABA 


A UGU ST 


ABA 


W IRI NG 


ABA 


USU AL 


ABA 


V ISI BLE 


ABA 


F UTU RE 


ABA 


D ISI NFECT 


ABA 


SUR VIV ED 


ABA 


ADV ISI NG 


ABAA 


*' HAV EBEE N 


ABA 


DEC ISI ON 


ABAA "• 


SESS ION 


ABA 


V ISI T 


ABAACC 


TATTOO 


ABA 


V ISI TOR 


:ABAB 


DETRA ININ G 


ABA 


POL ITI CS 


,'ABAB 


L ININ G 


ABA 


CR ITI QUE 


'ABAB 


M ININ G 


ABA 


POS ITI VE 


'ABAB 


OBTA ININ' G 


ABA 


MEM ORIAL 


ABAB 


RA ININ G 


ABA 


NAN 


ABAB 


REMA ININ G 


ABA 


DOMI NAN CE 


ABAB 


■ ' TRA ININ G' 


ABA 


ORD NAN CE 


ABAB 


CR ISIS 


ABA 


DOMI NAN T 


ABAB 


*■ * WI THTH E 


ABA 


NIN E 


ABAB 


PAR TITI ON 


ABA 


NIN ETY 


ABACA 


C ANADA 


ABA 


MOR NIN G 


ABACA 


P ANAMA 


ABA 


NIN TH 


ABACA 


PR ECEDE 


ABA 


OBO E 


ABACA 


ELEME NT 


ABA 


C OLO N 


ABACA 


ELEME NTARY 


ABA 


SEMIC OLO N 


ABACA 


ELEVE N 


ABA 


c olo'rs 


ABACA " 


C EMETE RY 


ABA 


AUT OMO BILE 


ABACA 


S EVERE 


ABA 


PR OMO TE 


ABACA 


AUD IBILI TY 


ABA 


H ONO R 


ABACA’ 


EXH IBITI ON 


ABA 


VIG ORO US 


ABACA 


V ICINI TY 


ABA 


M OTO R 


ABACA 


M ILITI A 


ABA 


'M OTO RIZED 


ABACA 


FAC ILITI ES 


ABA 


PR OVO ST 


ABACA 


D IMINI SH 


ABA 


PIP E 


' ABACA 


L IMITI NG 


ABA 


POP ULATED 


ABACA 


INITI AL 


ABA 


LIB RAR Y 


ABACA 


DEF INITI ON 


ABA 


AI RDR OME 


ABACA 


D IRIGI BLE 



3-23 



it- EgTIKCTED 



REF ID : A56895 



MISCELLANEOUS PATTERNS— Continued 



ABACA 


SEM IRIGI D 


ABACDA 


R 


ABACA 


REQU ISITI ON 


ABACDA 


U 


ABACA 


C IVILI AN 


ABACDA 1 ' 1 


PR 


ABACA 


D IVISI ON 


ABACDAAC 


S 


ABACA 


L OCOMO TIVE 


ABACDAACD 


S 


ABACA 


M ONOPO LY 


ABACDAC 


D 


ABACA 


PR OTOCO L 


ABACDAD 


D 


ABACA 


CONS TITUT E 


ABACDAED 




ABACA 


UNUSU AL 


ABACDAEEC 


,N 


ABACADA 


V ISIBILI TY 


ABACDB 


F 


abacadb 


DEF INITION 


ABACDB 


A 


ABACADBA 


PR ECEDENCE 


ABACDB 


C 


ABACADC 


INITIAT E 


ABACDBA 


TH 


ABACADD 


COMPL ETENESS 


ABACDC 


R 


ABACADDA 


• N AVALATTA CK 


ABACDC 


DYNA 


ABACADEC 


D IVISIONS 


ABACDCA 


L 


ABACB 


V ACANC Y 


ABACDCCA 




ABACB 


COMB ATANT 


ABACDCCAD 




ABACB 


C ATAST ROPHE 


ABACDCEA 


S 


ABACB 


D ETECT OR 


ABACDCECFGHIE 


M 


ABACB 


V ISITS " 


ABACDD 




ABACB 


MEMBE R 


ABACDD 


FO 


ABACBDEC 


D ETENTION 


ABACDDEC 




ABACBDEC 


R ETENTION 


ABACDEA 




ABACBDEFGFAG 


NONCOMBATANT 


ABACDEA 


D 


ABACC 


R EBELL ION 


ABACDEA 


VER 


ABACC 


N ECESS ARY 


ABACDEA 


S 


ABACC 


N ECESS ITY 


' abacdeAd 




ABACC 


CAR ELESS 


ABACDEAFGE 




ABACC 


WIR; ELESS 


ABACDEB 


EXPL 


ABACCA 


P ARALLA X 


ABACDEB 


T 


ABACCA 


R EPELLE D 


ABACDEBFA 


R 


ABACCA 


T OMORRO W 


ABACDEC 




ABACCDACC 


CAR ELESSNESS 


ABACDEC 


D 


ABACCDC 


P ARALLEL 


ABACDEC 


QU 


ABACCDEFEA 


N ECESSITATE 


ABACDECA 


P 


ABACDA 


; ALASKA 


ABACDECFBA 


D 


ABACDA 


ARABIAi, 


ABACDECFGB 


P 


ABACDA 


. N AVALBA ;SE 


ABACDED 


C 


ABACDA 


R ECEIVE ; 


ABACDED 


M 


ABACDA 


D ECEMBE R 


ABACDED 




ABACDA 


D EFENSE 


ABACDEDEDC 


G 


ABACDA 


R EJECTE D 


ABACDEDIj'BA 




ABACDA 


R ELEASE ! 


ABACDEDFGA 




ABACDA 


S ELECTE £> 


ABACDEFA 


D 


ABACDA 


R EMEDIE S 


ABACDEFA 


D 


ABACDA 


EMERGE NCY 


ABACDEFA 


T 


ABACDA 


ENEMIE S 


ABACDEFA 


D 


ABACDA 


R EPEATE D 


ABACDEFA 


D 


HEGTIUCTEB- 




3-24 





EVENUE 

NKNOWN 

0M0TI0 N 

EVENTEEN 

EVENTEENT H 

ESERTER 

EFENSES 

AVAILABL E 

AVALBATTL E 

ATALIT Y 

NONYMO US 

OLONEL 

EREFORE 

ECEIVI NG 

MOMETE R 

IMITATI ON 

NINETEEN 

NINETEENT H 

TATEMENT 

ETEOROLOGICAL 

FIFTEE N 

RTRESS 

FIFTEENT H 

ELEVATE 

EVELOPE 

IFICATI ON 

IMILARI TY 

SUSPENSE 

SUSPENSION 

ANATION 

OPOGRAP HIC 

ECEPTACLE 

ABANDON 

AMAGING 

ARANTIN E 

ENETRATE 

ETERI ORATE 

ENETRATION 

APABILI TY 

OTORCYC ' LE 

SUSPICI ON 

ENERALALAR M 

SUSPICIOUS 

SUSPICIONS 

EFECTIVE 

EFENSIVE 

ELEPHONE 

ETERMINE 

EVELOPME NT 




REF ID : A56895 



RESTRICTED 




MISCELLANEOUS 

9 


AQAtlDEFA 




EXERCISE 


ABACDEFAF 1, 




EXERCISES 


ABACDEFB 




DEDICATE 


ABACDEFB 




ENEMYTAN KS 


ABACDEFC 




DEDICATI ON 


ABACDEFCDFE 


V 


ETERINARIAN 


ABACDEFCFD 




ELECTRICIT Y 


ABACDEFD 




SUSPECTE D 


ABACDEFDF 




SUSPENDED 


ABACDEFE 




ANALYSIS 


ABACDEFGA 




EXECUTIVE 


ABACDEFGB 




POPULATIO N 


ABACDEFGBA 




ENEMYPLANE S 


ABACDEFGBA 


S 


EVENTYFIVE 


ABACDEFGBEHF 


D 


ETERMINATION 


ABACDEFGDHH 


G 


ENERALSTAFF 


ABACDEFGE 




MEMORANDA 


ABACDEFGHA 




MEMORANDUM 


ABACDEFGHIA 


D 


ECENTRALIZE 


ABBA 




AFFA IR 


ABBA 




APPA RENT 


ABBA 




APPA RENTLY 


ABBA 


B 


ARRA CKS 


ABBA 


B 


ARRA GE 


ABBA 




ARRA NGE 


ABBA 


P 


ASSA GE 


ABBA 




ASSA ULT 


ABBA 




ATTA CH 


ABBA 




ATTA CK 


ABBA 




ATTA IN 


ABBA 


B 


ATTA LION 


ABBA 


IN 


DEED 


ABBA 




EFFE CT 


ABBA 


COMP 


ELLE D 


ABBA 


SH 


ELLE D 


ABBA 


CONF 


ERRE D 


ABBA 


COMPR 


ESSE D 


ABBA 


IMPR 


ESSE D 


ABBA 


PR 


ESSE D 


ABBA 


V 


ESSE L 


ABBA 


CIGAR 


ETTE 


ABBA 


B 


ETTE R 


ABBA 


L 


ETTE R 


ABBA 


D 


IFFI CULT 


ABBA 


W 


ILLI AM 


ABBA 


F 


ILLI NG 


ABBA 


K 


ILLI NG 


ABBA 


REF 


ILLI NG 


ABBA 


SW 


IMMI NG 



PATTERNS— Continued 



ABBA 


SH IPPI NG 


ABBA 


M ISSI NG 


ABBA 


ADM ISSI ON 


ABBA 


M ISSI ON 


ABBA 


PERM ISSI ON 


ABBA 


F ITTI NG 


ABBA 


AFTER NOON 


ABBA 


NOON 


ABBA 


F OLLO f 


ABBA 


C OMMO N 


ABBA 


OPPO SE 


ABBA 


OPPO SITE 


ABBA 


B OTTO M 


ABBAB 


B AGGAG E 


ABBAB 


WITN ESSES 


ABBACA 


APPARA TUS 


ABBACA 


L ETTERE D 


ABBACB 


V ESSELS 


ABBACDA 


M ESSENGE R 


ABBACDA 


EFFECTE D 


ABBACDB 


M ISSIONS 


ABBACDEA 


IRRIGATI ON 


ABBACDEDA 


OPPOSITIO N 


abbacdefA 


EFFECTIVE 


ABBACDEFA 


D IFFICULTI ES 


ABBACDEFA 


IMMIGRATI ON 


ABBACDEFCd 


ILLITERATE 


abbacdefdB 


ATTAINMENT ' 


abbacdefeO 


ARRANGEMEN T 


abbacdefE# 


ATTACHMENT 


abbca 


ANNUA L 


abbca 


APPEA R 


abbca 


DIS APPEA R 


abbca 


C ARRIA GE 


abbca 


S ETTLE 


abbca 


ISSUI NG 


ABBCA 


FOUR TEENT H 


ABBCA 


SIX TEENT H 


ABBCA 


CHA UFFEU R 


ABBCA 


S URROU ND 


ABBCADAEFCf 


APPEARANCE 


ABBCADAEFC 


DIS' APPEARANCE 


ABBCADC 


APPEARE D 


ABBCBBDA 


P OSSESSIO N 


ABBCBDA 


ASSISTA NCE 


ABBCBDAED 


ASSISTANT 


ABBCCDAB 


ASSOONAS 


ABBCDA 


ALLOWA NCE 


ABBCDA 


APPROA CH 



-rwinrnTvrnnmTTv 




3-25 



REF ID : A56895 

RESTRICTED 



MISCELLANEOUS PATTERNS— Continued 



ABBCDA 


ARRIVA L 


ABCA 


ADVA NCE 


ABBCDA 


ASSURA NCE 


ABCA 


DI AGRA M 


ABBCDA 


M ESSAGE 


ABCA 


EV ALUA TION 


, ABBCDA 


ILLUMI NATE 


ABCA 


ALWA YS 


ABBCDAB 


M ESSAGES 


ABCA 


C AMPA IGN 


ABBCDAB 


C ORRIDOR 


ABCA 


M ANDA TE 


ABBCDAEA 


B ELLIGERE NT 


ABCA 


M ANUA L 


ABBCDAEFC 


ALLOCATIO N 


ABCA 


J ANUA RY 


ABBCDAEFC 


IMMEDIATE 


ABCA 


C ANVA S 


ABBCDAEFGAE 


ILLUMINATIN G 


ABCA 


CH APLA IN 


ABB CDAEFGAHE 


ILLUMINATION 


ABCA 


C APTA IN 


ABBCDAEFGAHE 


D ISSEMINATION . 


ABCA 


AREA 


ABBCDBCEA 


APPRQPRIA TE 


ABCA 


DEB ARKA TION. 


ABBCDCA 


EFFICIE NT 


ABCA 


EMB ARKA TION 


ABBCDCA 


C OLLISIO N 


ABCA 


ASIA 


ABBCDCAED 


EFFICIENC Y 


ABCA 


CO ASTA L 


ABBCDCAED 


C OLLISIONS 


ABCA 


C ASUA L 


ABBCDCEFA 


ADDITIONA L 


ABCA 


C ASUA LTY 


ABBCDDCA 


C OMMISSIO N 


ABCA 


AVIA TOR 


ABBCDDCA 


C OMMISSIO NER 


ABCA 


BARB ED 


ABBCDDCEAFGC 


ACCOMMODATIO N 


ABCA 


BOMB 


ABBCDEA 


ACCOMPA NY 


ABCA 


BOMB ARD 


ABBCDEA 


APPROVA L 


ABCA 


BOMB ER 


ABBCDEA 


ASSOCIA TE 


ABCA 


LIGHT BOMB ER 


ABBCDEA 


SH ELLFIRE 


ABCA 


BRIB E 


ABBCDEA 


T ERRIBLE 


ABCA 


BULB 


ABBCDEAFB 


ACCORDANC E 


ABCA 


CANC EL 


ABBCDEAFB 


REENFORCE 


ABCA 


CHEC K 


ABBCDEAFBC 


ACCEPTANCE 


ABCA 


CIRC LE 


ABBCDEAFBGBC 


REENFORCEMEN T 


ABCA 


CIRC ULATE 


ABBCDEAFD 


APPLICATI ON 


ABCA 


CONC EAL 


ABBCDEAFEC 


ASSOCIATIO N 


ABCA 


CONC LUDE 


ABBCDEAFGC 


'ACCEPTABLE 


ABCA 


HUN DRED 


ABBCDEAFGC 


ALLEGIANCE 


ABCA 


L EADE R 


ABBCDEAFGHF 


C ORRESPONDIN G 


ABCA 


EAGE R 


ABBCDEFGA 


ACCIDENTA L 


ABCA 


M EAGE R 


ABBCDEFGA 


APPROXIMA TE 


ABCA 


S EAME N 


ABBCDEFGA 


OCCUPATIO N 


ABCA 


ST EAME R 


ABBCDEFGBAHAC 


IRREGULARITIE S 


ABCA 


N EARE ST 


ABBCDEFGBA 


IRREGULARI TY 


ABCA 


C EASE 


ABBCDEFGEA 


ILLUSTRATI ON 


ABCA 


GR EASE 


ABBCDEFGHAD 


C OMMENDATION 


ABCA 


INCR EASE D . 


ABCA 


P ACKA GE 


ABCA 


L EAVE 


ABCA 


•EV ACUA TING 


ABCA 


ECHE LON 


ABCA 


EV ACUA TION 


ABCA 


WR ECKE D 


ABCA 


R ADIA L 


ABCA 


INF ECTE D 


ABCA 


R ADIA TE 


ABCA 


EDGE 


ABCA 


ADJA CENT 


ABCA 


S EIZE 


ABCA 


GR ADUA L 


ABCA 


R ELIE F 



RESTRICTED - 3.26 




REF ID: A5 68 95 



I?ESTI* 


ICTED 












MISCELLANEOUS 


PATTERNS- 


-Continued 


ABCA 




H ELPE R 


ABCA 


I NFAN TRY 


ABCA 




TW ELVE 


ABCA 


CO NFIN E 


ABCA 




NOV EMBE R 


ABCA 


U NION 


ABCA 




ABS ENCE 


ABCA 


SU NKEN 


ABCA 




LIC ENSE 


ABCA 


FLA NKIN G- 


ABCA 




C ENTE R 


ABCA 


I NLAN D 


ABCA 




ENTE R 


ABCA 


I NTEN D 


ABCA 




ENVE LOP 


ABCA 


' ' CO NTIN UAL 


ABCA 




R EQUE ST 


ABCA 


CO NTIN UE 


ABCA 




FI ERCE 


ABCA 


I NVEN T 


ABCA 




S ERGE ANT 


ABCA 


OCTO BER 


ABCA 




MAT ERIE L 


ABCA 


D OCTO R 


ABCA 




REV' ERSE 


ABCA 


F OGHO RN 


ABCA 




OBS ERVE 


ABCA 


P OISO N 


ABCA 




R ESPE CT 


ABCA 


C OMPO SED 


ABCA 




W ESTE RLY 


ABCA 


C ONVO Y 


ABCA 




W ESTE RN 


ABCA 


EN ORMO US 


ABCA 




ETHE R 


ABCA 


EXPL OSIO N 


ABCA 




JKAN EUVE R 


ABCA 


PUMP 


ABCA ; 




R EVIE W 


ABCA 


PURP OSE 


ABCA 




EXCE PT 


ABCA 


HA RBOR 


ABCA ' 




EXPE CT 


ABCA 


AI RBOR NE 


ABCA 




EXPE ND 


ABCA 


MU RDER 


ABCA 




EXTE ND * 


ABCA 


0 RDER 


ABCA 




GAUG E . 


ABCA 


0 RDER S 


ABCA 




GEOG RAPHIt 


' ABCA 


REAR 


ABCA 




FOR GING 


ABCA 


RECR UIT 


ABCA 




W HICH 


ABCA 


COU RIER 


ABCA 


1 X ' 


HIGH 


ABCA 


P RIOR 


ABCA 




HIGH ER 


ABCA 


SUPE RIOR 


ABCA 




HIGH EST 


ABCA 


A RMOR 


ABCA 




V ICTI M 


ABCA 


A RMOR Y 


ABCA 




M IDNI GHT 


ABCA 


P ROGR AM 


ABCA 




DR IFTI NG 


ABCA 


MO RTAR 


ABCA 




L IFTI NG 


ABCA 


QUA RTER 


ABCA 




S IGNI FY 


ABCA 


QUA RTER S 


ABCA 




BU ILDI NG 


ABCA 


FEB RUAR Y 


ABCA 




INDI CATE 


ABCA 


FO RWAR D 


ABCA 




INDI RECT 


ABCA 


CEN SORS HIP 


ABCA 




DESCR IPTI ON 


ABCA, 


SUNS ET 


ABCA 




L IQUI D 


ABCA 


IMPOR TANT 


ABCA 




A IRFI ELD 


ABCA 


S TART 


ABCA 




REPR ISAL 


ABCA 


PRO TECT 


ABCA 




M ISFI RE 


ABCA 


TENT 


ABCA’ 




F ISHI NG 


ABCA 


TENT H 


ABCA 




W ITHI N 


ABCA 


PRO TEST 


ABCA 




FUE LOIL 


ABCA 


TEXT 


ABCA 




MAIM 


ABCA 


THAT 


ABCA 




LA NDIN G 


|BCA 


S TRAT EGI 



m?crroTf<rrprt 




3-27 



REE ID: A56895 



RESTRICTED 

MISCELLANEOUS PATTERNS— Continued 



ABCA 


S 


TRAT EGY 


ABCAC 


P 


RAIRI E 


ABCA 


D 


UGOU T 


ABCAC 


PRO 


TESTS 


ABCA 




UNSU ITABLE 


ABCACA 


D 


• IETITI AN 


ABCA 


P 


URSU E 


ABCACB 


0 


RDERED 


ABCA 


P 


URSU IT 


ABCACBDEC 




PROPORTIO N 


ABCA 


0 


UTGU ARD 


ABCACDEFD 




PROPOSALS 


ABCAA 


D 


ECREE 


ABCADA 




ALMANA C 


ABCAA 


D 


EGREE 


ABCADA 


R 


ELIEVE 


ABCAA 


B 


ETWEE N 


ABCADA 


C 


ENTERS D 


ABCAA 


DI 


SCUSS 


ABCADA 


B 


ESIEGE D 


ABCAA 


A 


SPOSS IBLE 


ABCADA 


R 


EVIEWE D 


ABCAAB 


P 


ONTOON 


ABCADAB 


CO 


NTINENT AL 


ABCAAB 




THATTH E 


ABCADAC 


S 


EALEVEL 


ABCAACDEB 


P 


REARRANGE D 


ABCADAC 




INDIVID UAL 


ABCAB 


W 


ARFAR E 


ABCADAEC 




IGNITION 


ABCAB 


S 


ECREC Y 


ABCADAEFB 




TENTATIVE 


ABCAB 


OBS 


ERVER 


ABCADAEFC 


S 


IGNIFICAN T- 


ABCAB 


w 


HETHE R 


ABCADAEFCE 


S 


IGNIFCCANC E 


ABCAB 


B 


INDIN G 


ABCADAEFGHF 




SUBSISTENCE 


ABCAB 


F 


INDIN. G 


ABCAD& 




ATLANT IC 


ABCAB 


S 


INKIN G 


ABCAD& 




BRIBER Y 


ABCAB 


PA 


INTIN G 


ABCADB 




CIRCUI T 


ABCAB 


PR 


INTIN G 


ABCADB 


W 


EDNESD AY 


ABCAB 


. I 


NTENT 


ABCADB 


LOG 


ISTICS 


. ABCAB 


P 


ONTON 


ABCADB 


EXPL 


OSIONS 


ABCAB 


C 


ORPOR AL 


ABCADB 




PREPAR ING 


ABCAB 




RECRE ATI ON 


ABCADB 


IM 


PROPER 


ABCAB 


P 


RIORI TY ' 


ABCADB 




PROPER 


ABCAB 


SUPE 


RIORI TY 


ABCADBA 




INSIGNI A 


ABCAB 


DI 


SEASE 


ABCADBC 




PREPARE 


ABCAB 


PRO 


TECTE D 


ABCADBCEFCGG 




PREPAREDNESS 


ABCAB 


PRO 


TESTE D 


ABCADBD 




PREPARA TION 


ABCAB 


0 


UTPUT 


ABCADBEFD 




CIRCUITOU S 


ABCABA 


INT 


ERFERE 


ABCADC 


R 


ADIATI ON 


ABCABB 


D 


ISMISS 


ABCADC 


ST 


ANDARD 


ABCABB 


D 


ISMISS AL 


ABCADC 


V 


ARIATI ON 


ABCABC 




THATHA VE 


ABCADC 




ASIATI C 


ABCABCA 




ENTENTE 


ABCADC 




AVIATI ON 


ABCABDA 


S 


ENTENCE 


ABCADC 


R 


EVIEWI NG 


ABCABDB 




REPRESE NT 


ABCADC 




EXTENT 


ABCABDBEFGFHIB 




REPRESENTATIVE 


ABCADC 


I 


NVENTE D 


ABCABDBEFGFHIED 




REPRESENTATIONS 


ABCADC 




TACTIC S 


ABCABDC 




RETREAT 


ABCADC. 


S 


TARTER 


ABCABDED 


M 


ANGANESE 


ABCADCJ 




ZIGZAG 


ABCABDEFA 


C 


ORPORATIO N 


ABCADCA 


CO 


NVENIEN T 


ABCABDEFGHD 




RECREATIONA L 


ABCADCB 


CO 


NDENSED 


ABCAC 




ARMAM ENT 


ABCADCB 




TACTICA L 


ABCAC 


N 


EARER 


ABCADCEFBGABC 




ENTERTAINMENT 


ABCAC 




PROPO SE 


ABCADCEFGED 

l 




CONCENTRATE 



RESTRICTE D 



O 

J 



23 




REF ID : A56895 



REPTniCTED 



MISCELLANEOUS PATTERNS— Continued 



ABCADCEFGEHC 


CONCENTRATIN G 


ABCADEFA 


ENVELOPE 


ABCADCEFGEHBC 


CONCENTRATION 


ABCADEFA 


EXPEDITE 


ABCADD 


D EPRESS ION 


ABCADEFA 


EXPERIME NT 


ABCADD 


EXCESS 1 


ABCADEFAB 


INDICATIN G 


ABCADD 


D ISTILL 


ABCADEFAB 


D ISTINGUIS H 


ABCADD 


P OSTOFF ICE j 


ABCADEFABGADE 


D ISTINGUISHING 


ABCADD 


B OYCOTT / 


ABCADEFAGB 


INDICATION 


ABCADDA 


AMBASSA DOR 


ABCADEFB 


ADVANCED 


ABCADDA 


EXPELLE D 


ABCADEFBA 


EXT RAORDINAR Y 


ABCADDECCFA 


UNSUCCESSFU L 


ABCADEFC 


BOMBARDM ENT 


ABCADDEFA 


EXCESSIVE 


ABCADEFC 


CIRCULAR 


ABCADEA 


ADVANTA GE 


ABCADEFC 


• U NTENABLE 


ABCADEA 


ADVANTA GEOUS 


ABCADEFCGHB 


RETROACTIVE 


ABCADEA 


D ECREASE 


ABCADEFD 


ADVANCIN G 


ABCADEA 


S EPTEMBE R 


ABCADEFD 


EXTENDIN G 


ABCADEA 


R EQUESTE D 


ABCADEFD 


EXTERIOR 


ABCADEA 


D ISCIPLI NE 


ABCADEFE 


CONCRETE 


ABCADEAB 


CO NTINGENT 


ABCADEFE 


EXPEDITI NG 


ABCADEAE 


EXPENDED 


ABCADEFE 


EXPEDITI ON 


ABCADEAE 


EXPENSES 


ABCADEFE 


OBSOLETE 


ABCADEAE 


EXTENDED 


ABCADEFE 


G ONIOMETE R 


ABCADEAFA 


ELSEWHERE 


ABCADEFE ' 


PURPOSES 


ABCADEAFGA 


EXPERIENCE 


ABCADEFE 


RECRUITI NG 


ABCADEB 


C ENTERIN G 


ABCADEFEA 


C OMPOSITIO N 


ABCADEB 


ENTERIN G 


ABCADEFGA 


EXPENSIVE 


ABCADEB 


R ESPECTS 


ABCADEFGA 


EXTENSIVE 


ABCADEB 


INCIDEN T 


ABCADEFGAF 


ECHELONMEN T 


ABCADEB 


M ISFIRES 


ABCADEFGB 


C ASUALTIES 


Abcadebce 


INCIDENCE 


ABCADEFGB 


CIRCULATI ON 


ABCADEC 


M ANDATED 


ABCADEFGBC 


CONCLUSION 


ABCADEC 


S ECRETAR Y 


ABCADEFGC 


INDICATED 


ABCADEC 


GYR OSCOPIC 


ABCADEFGC 


S TRATEGICA L 


ABCADECA 


REARGUAR D 


ABCADEFGD 


EXTENSION 


ABCADECAFD 


D ISTINCTION 


ABCADEFGDC 


CONCEALMEN T 


ABCADECFC 


CONCERNIN G 


ABCADEFGE 


REPRISALS 


ABCADEDA 


CO NFINEMEN T 


ABCADEFGF 


BOMBARDED 


ABCADEDAFB 


INVITATION 


ABCADEFGHAB 


C ONFORMATION 


ABCADEDBD 


SUBSTITUT E 


ABCADEFGHCA 


EXTERMINATE 


ABCADEDBDE 


SUBSTITUTI ON 


ABCADEFGHCFIG 


EXTERMINATION 


ABCADEDC 


LI EUTENANT 


ABCADEFGHEIGCF 


REORGANIZATION 


ABCADEDFGA 


ENTERPRISE 


ABCADEFGHH 


R ESPECTFULL Y 


ABCADEDFGDBC 


CONCILIATION 


ABCADEFGHIAJF 


CIRCUMSTANCES 


ABCADEDFGFB 


ENTERPRISIN G 


ABCADEFGHIB 


RETROACTIVE 


ABCADEE 


P ROGRESS 


ABCADEFGHIE 


GEOGRAPHICA L' 


ABCADEEBFGHC 


CANCELLATION 


ABCADEFGHIGBH 


CIRCUMSTANTIA L 


ABCADEED 


CANCELLE D 


ABCBA 


COMP LETEL Y 


ABCADEEFBC 


CONCESSION 


ABCBA 


AWKWA RD 


ABCADEEFGD 


P ROGRESSIVE 


ABCBA 


CAPAC ITY 


ABCADEFA 


ECHELONE D 


ABCBA 


PA CIFIC 



REQTmqTED 



REF ID : A56895 



RESTRICTED 



MISCELLANEOUS PATTERNS— Continued 



ABCBA 


SPE CIFIC 


ABCBDEBA 


RECEIVER 


ABCBA 


HIN DERED 


ABCBDEBA 


REPEATER 


ABCBA 


DIVID E 


ABCBbEFA 


REJECTOR 


ABCBA 


GARAG E 


ABCBDEFA 


STATIONS 


ABCBA 


C ITATI ON 


ABCBDEFBA 


DEVELOPED 


ABCBA 


LEVEL 


ABCBDEFGA 


R ESISTANCE 


ABCBA ' 


P REFER 


ABCBDEFGBA 


DETERMINED . 


ABCBA { 


REFER 


ABCBDEFGHFA 


DISINFECTED 


ABCBA 


P RESER VATION 


ABCBDEFGHIJBA • 


DECENTRALIZED 


ABCBA 


RESER VATION 


ABCCA | 


LITTL E 


ABCBA 


TAXAT ION 


ABCCA j 


PASSP ORT 


ABCBA 


HOS TILIT Y 


ABCCA 1 


. S TREET 


ABCBA 


U TILIT Y 


ABCCABDEC 


C ROSSROADS 


ABCBA 


AC TIVIT Y 


ABCCBADED 


MILLIMETE R 


ABCBAA 


U SELESS 


ABCCBCA 


BE GINNING 


ABCBAAB 


P REFERRE D 


ABCCBDA 


INF LAMMABL E 


ABCBAB 


DIVIDI NG 


ABCCDA 


COLLEC T 


ABCBAB 


AC TIVITI ES 


ABCCDA 


CORREC T 


ABCBABDEB 


.P REFERENCE 


ABCCDA 


T RIGGER 


ABCBABDEB 


REFERENCE 


ABCCDA 


RUBBER 


ABCBADA 


MINIMUM 


ABCCDA 


RUNNER 


ABCBADB 


P RESERVE 


ABCCDA 


SPOOLS 


ABCBADB 


RESERVE 


ABCCDA 


SPOONS ■ 


ABCBADB 


REVERSE 


ABCCDA 


SUGGES T 


ABCBADBC 


RESERVES 


4BCCDA 


SUPPOS E 


ABCBADEB 


SPE CIFICATI ON 


ABCCDA ; 


TURRET 


ABCBCDBA 


REMEMBER . 


ABCCDAA 


SUCCESS 


ABCBDA 


DEFEND 


ABCCDAAEB 


SUCCESSFU L 


ABCBDA 


DEPEND 


ABCCDAAEBFF 


SUCCESSFULL Y 


ABCBDA 


MU NITION S 


ABCCDAAEFD 


SUCCESSIVE 


ABCBDA 


RESEAR CH 


ABCCDAB 


P RESSURE 


ABCBDA 


STATES 


ABCCDAEC 


TERRITOR Y 


ABCBDA 


STATUS 


ABCCDAED 


CORRECTE D 


ABCBDA 


IN TEREST 


ABCCDAEFB 


COLLECTIO N • 


ABCBDAB 


DEFENDE R 


ABCCDAEFB 


CORRECTIO N 


ABCBDAB 


E NGAGING 


ABCCDAEFBC 


CONNECTION 


ABCBDAB A 


DEFENDED 


Abccdaefc 


CONNECTIN G 


ABCBDABD 


DEPENDEN T 


ABCCDAEFDGG 


CORRECTNESS 


ABCBDABDEA 


STATISTICS 


ABCCDEA 


GASSING 


ABCBDAEFGB 


DEPENDABLE 


ABCCDEA 


GETTING 


ABCBDAEFGHG 


DEPENDABILI TY 


ABCCDEA 


ST RAGGLER 


ABCBDCBA 


PARAGRAP H 


ABCCDEA 


IN TERRUPT 


ABCBDDBA 


DEFERRED 


ABCCDEAB . 


IN TERRUPTE D 


ABCBDEA 


E CONOMIC 


ABCCDEAD 


COMMENCE 


ABCBDEA 


DAMAGED 


ABCCDEAD 


COMMERCE 


ABCBDEA 


PO LITICAL 


ABCCDEADCDE 


COMMENCEMEN T 


ABCBDEAEC 


MANAGEMEN T 


ABCCDEBFGHDA 


DISSEMINATED 


ABCBDEBA 


DEFEATED 


ABCCDEFA 


COMMUNIC ATE 


ABCBDEBA 


DESERTED 


ABCCDEFA 


SUPPLIES 



RESTRICTED 3-30 




REF ID : A56895 



RESTRICTED 



M ISCELLANEOUS PATTERNS— Continued 



ABCCDEFAGHFBE 


COMMUNICATION 


ABCDA 




INSPI RE 


ABCCDEFBGHDGAD 


CORRESPONDENCE 


ABCDA 




LOCAL 


ABCCDEFGA 


R EAPPOINTE D 


ABCDA 


LAU 


NCHIN G 


ABCCDEFGHAFG 


R E APPOINTMENT 


ABCDA 


CO 


NDEMN 


ABCDA 


S ABOTA GE 


ABCDA 


MACHI 


NEGUN 


ABCDA 


R AILWA Y 


ABCDA 




NOTIN G 


ABCDA 


ANIMA L 


ABCDA 


EXPA 


NSION 


ABCDA 


S ANITA RY 


ABCDA 


CO 


NTAIN 


ABCDA 


M ARSHA L 


ABCDA 


MOU 


NTAIN 


ABCDA 


M ARTIA L 


ABCDA 


I 


NTERN AL 


ABCDA 


E ASTWA RD 


ABCDA 


FRO 


NTLIN E 


ABCDA 


N ATURA L 


ABCDA 


I 


NTREN CH 


ABCDA 


N ATURA LIZE 


ABCDA 


C 


ONTRO L 


ABCDA 


TE CHNIC- AL 


ABCDA 


H 


ORIZO N 


ABCDA 


COUNC IL 


ABCDA 




OUTBO ARD 


ABCDA 


R EACHE D 


ABCDA 




PROMP T 


ABCDA 


L EAGUE 


ABCDA 




RECOR D 


ABCDA 


EASTE RLY 


ABCDA 




REPOR T 


ABCDA 


EASTE RN 


ABCDA 




RETUR N 


ABCDA 


W EATHE R 


ABCDA 


P 


RIMAR Y 


ABCDA 


H EAVIE R 


ABCDA 




RIVER 


ABCDA 


INS ECURE 


ABCDA 




ROGER 


ABCDA 


S ECURE 


ABCDA 


FA 


RTHER 


ABCDA 


R EDUCE 


ABCDA 


FU 


RTHER 


ABCDA 


SCH EDULE 


ABCDA, 


NO 


RTHER LY 


ABCDA 


B EFORE 


ABCDA 




SATIS FY 


ABCDA 


R EFUGE 


ABCDA 




SHIPS 


ABCDA 


R EFUSE 


ABCDA 


WAR 


SHIPS 


ABCDA 


R EGIME NT 


ABCDA 




THIRT Y 


ABCDA 


R EGIME NTAL 


ABCDA 


WI 


THOUT 


ABCDA 


EITHE R 


ABCDA 


EX 


TRACT 


ABCDA 


FUS ELAGE 


ABCDA 




TRACT 


ABCDA 


D ELIVE R ' 


ABCDA 


INS 


TRUCT 


ABCDA 


GR ENADE 


ABCDA 


DES 


TRUCT ION 


ABCDA 


ERASE 


ABCDA r 




TWENT Y 


ABCDA 


OP ERATE 


ABCDA ' 


B 


UREAU 


. ABCDA 


R ESCUE 


ABCDA . 




WESTW ARD 


ABCDA 


PR ESIDE NT 


ABCDAA 


R 


EFUGEE 


ABCDA 


R ESUME 


ABCDAA 


C 


ODEBOO K 


ABCDA 


D EVICE 


ABCDAA 


BU 


SINESS 


ABCDA 


D EVISE 


ABCDAA 


DI 


STRESS 


ABCDA 


GOING 


ABCDAA 




STRESS 


ABCDA 


T HOUGH 


ABCDAAD 


F 


ORENOON 


ABCDA 


C HURCH 


ABCDAB 




DECIDE 


ABCDA 


F IGHTI NG 


ABCDAB 




DECODE 


ABCDA 


INFLI CT 


ABCDAB 


SP 


EARHEA D 


ABCDA 


EXT'INGUI SH 


ABCDAB 


R 


EDUCED 


ABCDA 


INQUI RE 


ABCDAB 




ENTREN CH 


ABCDA 


INQUI RY 


ABCDAB 




ERASER 







3-31 



nESTRICTE B 



REF ID : A56895 



MISCELLANEOUS 



ABCDAB 




GEORGE 


ABCDAB 




POSTPO NE 


ABCDAB 




RETIRE 


ABCDAB 


ES 


TIMATI ON 


ABCDABA 




DECIDED 


ABCDABAB 




INCLININ G 


ABCDABC 


M 


AINTAIN 


ABCDABC 


M 


AINTAIN ED 


ABCDABCEFD 




PHOSPHORUS 


ABCDABEFA 




ENTRENCHE D 


ABCDAC 


L 


ANGUAG E 


ABCDAC 




ANYWAY 


ABCDAC 


GOV 


ERNMEN T 


ABCDAC 


I 


NSTANT 


ABCDAC 


I 


NSTANT LY 


ABCDAC 


DI 


SPERSE 


ABCDAC 


RES 


TRICTI ON 


ABCDAC 


PA 


TRIOTI C 


ABCDACB 


CO 


NDEMNED 


ABCDACDAEFGB 


I 


NSTANTANEOUS 


ABCDACEFDAF 




COINCIDENCE 


ABCDAD 




MOVEME NT 


ABCDAD 


A 


MUSEME NT 


ABCDAD 




RIGORO US 


ABCDADC 


S 


ANITATI ON 


ABCDADEDAFB 




INSTITUTION 


ABCDADEFEAGC 




ANTIAIRCRAFT 


ABCDAEA 




EXTREME 


ABCDAEA 




MAXIMUM 


ABCDAEAB 


SU 


ITABILIT Y 


ABCDAEABD 


UNI 


TEDSTATES 


ABCDAEAE 


PAR 


ENTHESES 


ABCDAEB 


F 


IGHTING 


ABCDAEB 


S 


IGHTING 


ABCDAEB 




RAILROA D 


ABCDAEB 




REPORTE D 


ABCDAEB 




RETURNE D 


ABCDAEB 




TRACTOR ■ 


ABCDAEB 


INS 


TRUCTOR 


ABCDAEBA 




RECORDER 


ABCDAEBC 


DE 


TONATION 


ABCDAEBFBDC 


U 


NIDENTIFIED 


ABCDAEBFC 




SATISFACT ORY 


ABCDAEC 




AVERAGE 


ABCDAEC 


D 


ISTRICT 


ABCDAEC 




OUTPOST 


ABCDAECA 




TWENTIET H 


ABCDAECAB 


I 


NTERNMENT 


ABCDAECB 


D 


ISTRICTS 



PATTERNS— Continued . 



ABCDAECD 


L 


ABORATOR Y 


ABCDAECE 




OUTPOSTS 


ABCDAECFD 


EX 


AMINATION 


ABCDAED 


T 


RAVERSE 


ABCDAEE 




ACTUALL Y 


ABCDAEE 




EXPRESS 


ABCDAEE 




THIRTEE N 


ABCDAEEFAB 




THIRTEENTH 


ABCDAEFA 


OV 


ERWHELME D 


ABCDAEFAB 




INFLICTIN G 


ABCDAEFB 


P 


RESCRIBE D 


ABCDAEFBE 


0 


NEHUNDRED 


ABCDAEFC 


M 


ANUFACTU RE 


ABCDAEFC 


PR 


ESIDSNTI AL 


ABCDAEFC 


D 


ISTRIBUT E 


ABCDAEFCA 


D 


ISTRIBUTI NG 


ABCDAEFCA 


D 


ISTRIBUTI ON 


ABCDAEFD 


F 


LASHLIGH T 


ABCDAEFD 


C 


ONTROVER SY 


ABCDAEFD 


A 


SCENSION 


ABCDAEFD 




WINDWARD 


ABCDAEFDB 




RESTRICTE D 


ABCDAEFDE 




RESTRICTI ON 


ABCDAEFE 


PAR 


ENTHESIS 


ABCDAEFE 




RETURNIN G 


ABCDAEFEGE 


RE 


SPONSIBILI TY 


ABCDAEFF 




REDCROSS ■ 


ABCDAEFGAHB 




INSPIRATION 


ABCDAEFGC 




REGARDING 


ABCDAEFGD 




RESTRAINT 


ABCDAEFGFE 


TR 


ANSPACIFIC 


ABCDAEFGHC 




TWENTYFIVE 


ABCDAEFGHFBC 


. 


CONSCRIPTION 


ABCDBA 


PR 


ACTICA L 


ABCDBA 


W 


ATERTA NK 


ABCDBA 


DIV 


EBOMBE R 


ABCDBA 




ENGINE 


ABCDBA 


S 


ENTINE L 


ABCDBA 


R 


EVOLVE 


ABCDBA 


S 


ITUATI ON 


ABCDBAA 




ENGINEE R 


ABCDBAAEDBC 




ENGINEERING 


ABCDBAB 




LIABILI TY 


ABCDBAD 


RE 


TALIATI ON 


ABCDBAEAD 


D 


ISPOSITIO N . 


ABCDBAEBE 


U 


NEXPENDED 


ABCDBBA 




ANTENNA 


ABCDBBA 


D 


ISCUSSI ON 


ABCDBBDEA 


TRA 


NSMISSION 



REGTRICTEB - 3.32 




REF ID: A5 68 95 



HEOTRICTED 



MISCELLANEOUS PATTERNS— Continued 



ABCDBCAEB 


INTENTION 


ABCDCEBA 


ELIGIBLE 


ABCDBCEA 


A ERODROME 


ABCDCECA 


D ESTITUTE 


ABCDBEA 


INCENDI ARY 


ABCDCECDA 


CO NSTITUTIN G 


ABCDBEA 


PR OTECTIO N 


ABCDCEFGAB 


PHOTOGRAPH Y 


ABCDBEA 


IN TERCEPT 


ABCDCEFGCA 


DEM OBILIZATIO N • 


ABCDBEAB 


IN TERCEPTE D 


ABCDCEFGCA 


M OBILIZATIO N 


ABCDBEAE 


C ONTINUOU S 


ABCDDA 


R ECOMME ND 


ABCDBEAFB 


INVENTION 


ABCDDA 


T 3 OBACCO 


ABCDBEAFCDB 


QU ARTERMASTER 


ABCDDA 


SHELLS 


ABCDBEAFD 


INCENTIVE 


ABCDDAB 


B EACHHEA D 


ABCDBEAFD 


INTENSIVE 


ABCDDAEACBE 


INEFFICIENC Y 


ABCDBECA 


E NCIRCLIN G 


ABCDDAEFAF 


R ECOMMENDED 


ABCDBEFAGABC 


ENTANGLEMENT 


ABCDDAEFGHICE 


R ECOMMENDATION 


ABCDBEFAGEB 


TEMPERATURE 


ABCDDEA 


DROPPED 


ABCDBEFBA 


DECREASED 


ABCDDEA 


AI RSUPPOR T 


ABCDBEFCDAB 


C ONTINUATION 


ABCDDEA 


A RTILLER Y 


ABCDBEFGA 


YESTERDAY 


ABCDDEAEC 


COEFFICIE NT 


ABCDBEFGAB 


ARMOREDCAR 


ABCDDECDFA 


SCHOOLHOUS E 


ABCDBEFGBCHIA 


DISTINGUISHED 


ABCDDEFCGHA 


MI SCELLANEOUS 


ABCDBEFGHA 


P ERFORMANCE 


ABCDDEFEACGE 


CLASS I FI C ATI ON 


ABCDCA 


AIRCRA FT 


ABCDDEFGGEDBA 


R ECONNAISSANCE 


ABCDCA 


CRITIC' 


ABCDEA 


AERONA UTICS 


ABCDCA 


CRITIC AL 


ABODE A 


R AILHEA D 


ABCDCA 


D EFICIE NT 


ABCDEA 


AIRPLA NE 


ABCDCA 


ENGAGE 


ABCDEA 


AMBULA NCE 


ABCDCA 


P OSITIO N 


ABCDEA 


CO ASTGUA RD 


ABCDCA 


PR OVISIO N 


ABCDEA 


M ATERIA L 


ABCDCA 


FI REALAR M 


ABCDEA 


S ATURDA Y 


ABCDCAAC 


PHILIPPI NES 


ABCDEA 


C AUSEWA Y 


ABCDCAB 


ANTITAN K 


ABCDEA 


N AUTICA L 


ABCDCABCA 


I NDEPENDEN T 


ABCDEA 


BLOCKB US TER 


ABCDCAC 


CRITICI SE 


ABCDEA 


ME CHANIC 


ABCDCAC 


CRITICI SM 


ABCDEA 


CHEMIC AL 


ABCDCAD 


OPINION 


ABCDEA 


CONDUC T 


ABCDCAEAB 


ENGAGEMEN T 


ABCDEA 


DISLOD GE 


ABCDCAEB 


P OSITIONS 


ABCDEA 


DOWNED 


ABCDCAED 


D EFICIENC Y 


ABCDEA 


B ECAUSE 


ABCDCAED 


PR OVISIONS 


ABCDEA 


D ECIPHE R 


ABCDCAEFD 


CHARACTER 


ABCDEA 


D ECLARE 


ABCDCAEFDGHEGA 


CHARACTERISTIC 


ABCDEA 


OBJ ECTIVE 


ABCDCBABC 


IN TERPRETER 


ABCDEA 


L ECTURE 


ABCDCBCEA 


HO STILITIES 


ABCDEA ' 


V EHICLE S 


ABCDCEA 


BRI DGEHEAD 


ABCDEA 


ENCODE 


ABCDCEA 


M EDICINE 


ABCDEA 


COMP ENSATE 


ABCDCEA 


D EFINITE 


ABCDEA 


ENTIRE 


ABCDCEA 


S EPARATE 


ABCDEA 


R EPLACE 


ABCDCEA 


SURPRIS E 


ABCDEA 


R EPULSE D 


ABCDCEAFC 


QU ALIFICATI ON 


ABCDEA 


CONSID ERABLE 


ABCDCEAFE 


P ERSISTENT 


ABCDEA 


INT ERPOSE 




REOTRICTED 



3-33 



REF ID: A5 68 95 



MISCELLANEOUS PATTERNS— Continued 



ABCDEA 


S ERVICE 


ABCDEABFD 


NATIONALI SM 


ABCDEA 


EUROPE 


ABCDEABFDC 


NATIONALIT Y 


ABCDEA 


EUROPE AN 


ABCDEAB FE 


MARKSMANS HIP 


ABCDEA 


EXCITE 


ABCDEABFFGHD 


SHARPSHOOTER 


ABCDEA 


T HROUGH 


ABCDEABFGDHF 


W ARDEPARTMENT 


ABCDEA 


IDENTI CAL 


ABCDEAC 


AUTOMAT IC 


ABCDEA 


IDENTI FY 


ABCDEAC 


AI RCONTRO L 


ABCDEA 


INHABI TED 


ABCDEACFB 


ANTEDATIN G 


ABCDEA 


D IRECTI ON 


ABCDEAD 


CONTACT 


ABCDEA 


MEDIUM 


ABCDEAD 


V ICTORIO US 


ABCDEA 


SY NCHRON IZE 


ABCDEAD 


C RUISERS 


ABCDEA 


JU NOTION 


ABCDEADFD 


THREATENE D 


ABCDEA ' ' 


CO NFIDEN T 


ABCDEAE 


ENCODED 


ABCDEA 


NOTHIN G 


ABCDEAE 


P ERMANEN T 


ABCDEA 


E NTRAIN 


ABCDEAE 


FORTIFI ED 


ABCDEA 


L OCATIO N 


ABCDEAE 


REQUIRI NG 


ABCDEA 


REV OLUTIO N 


ABCDEAEFGC 


TRADITIONA L 


ABCDEA 


DEC ORATIO N 


ABCDEAFA 


R EPLACEME NT 


ABCDEA 


T ORPEDO 


ABCDEAFAGE 


EXCITEMENT 


ABCDEA 


OVERCO MING 


ABCDEAFAGHEAID 


IDENTIFICATION 


ABCDEA . 


T RAILER S 


ABCDEAFB 


CLERICAL 


ABCDEA 


T RAWLER 


ABCDEAFB 


INVASION 


ABCDEA 


DI RECTOR 


ABCDEAFBC 


RESOURCES 


ABCDEA 


REPAIR 


ABCDEAFC 


DES IGNATION 


ABCDEA 


NO RTHWAR D 


ABCDEAFC 


RES IGNATION 


ABCDEA 


C RUISER 


ABCDEAFC 


CO NFIDENTI AL 


ABCDEA 


I SLANDS 


ABCDEAFD 


D IMENSION 


ABCDEA 


STRIPS 


ABCDEAFE 


ADJUTANT 


ABCDEA 


SUNRIS E 


ABCDEAFE 


INTERIOR 


ABCDEA 


TARGET 


ABCDEAFE 


I NFLUENCE 


ABCDEA 


NOR THEAST 


ABCDEAFF 


R EADINESS 


ABCDEA 


THREAT 


ABCDEAFGA 


.D ECIPHERME NT 


ABCDEA 


NOR THWEST 


ABCDEAFGAFB 


MEDIUMBOMBE R 


ABCDEA 


TWELFT H 


ABCDEAFGD 


LEGISLATI ON 


ABCDEA 


L UMINOU S 


ABCDEAFGE 


CO MPARTMENT 


ABCDEAA 


EIGHTEE N 


ABCDEAFGEE 


SMOKESCREE N 


ABCDEAAE 


SUBMISSI ON 


ABCDEBA 


DELAYED 


ABCDEAAFED 


EIGHTEENTH 


ABCDEBA 


D ETONATE 


ABCDEAB 


INVADIN G 


ABCDEBA 


INDEMNI TY 


ABCDEAB 


F LEXIBLE 


ABCDEBA 


D ISPERSI ON 


ABCDEAB 


NATIONA L 


ABCDEBA 


RECOVER 


ABCDEAB 


REQUIRE 


ABCDEBA 


SURPLUS 


ABCDEAB 


RESTORE D 


ABCDEBAB 


ARBITRAR Y 


ABCDEAB 


OU TSKIRTS 


ABCDEBAED 


ARBITRATI ON 


ABCDEABA 


DEMANDED 


ABCDEBFA' 


B RIGADIER 


ABCDEABD 


IMPEDIME NTA 


ABCDEBFAGA 


ENCOUNTERE D 


ABCDEABE 


AT OMICBOMB 


ABCDEBFCAGBF 


INTERNATIONA L 


ABCDEABF 


REPAIRED 


ABCDEBFDGA 


NAVIGATION 


ABCDEABFB 


REQUIREME NT 


ABCDEBFGAF 


H EADQUARTER S 



3-34 




REF ID: A5 68 95 



liEfiTDICTEfr 



M 1SCEU, A.NEOUS PATTERNS— Continued 



ABCDEBFGHA 


R ESPONSIBLE 


ABCDEEA 


ENROLLE D 


ABCDEBFGHBCGIA 


NATURALIZATION 


ABCDEEA 


P ERSONNE L 


ABCDECA 


E NLISTIN G 


ABCDEEA 


IMPASSI BLE 


ABCDECA 


PRINCIP AL 


ABCDEEA 


IMPOSSI BLE 


AB.CDECA 


PRINCIP LE 


ABCDEEACB , 


S IGNALLING 


ABCDECA 


SKIRMIS H 


ABCDEEAFDBC 


INTELLIGENT 


ABCDECAB 


I NTERMENT 


ABCDEEAFDBGD 


INTELLIGENCE 


ABCDECAC 


I NTERVENE 


ABCDEEDFGBA 


RECONNOITER 


ABCDECACFE 


M AINTENANCE 


ABCDEEDFGBAFE 


RECONNOITERIN G 


ABCDECAFCDA 


TRANSATLANT IC 


ABCDEEFAB 1 


ENROLLMEN T 


ABCDECBA 


NEGLIGEN T 


ABCDEEFAB 


C ONFESSION 


ABCDECBA 


REVOLVER 


ABCDEEFAE 


EMBASSIES 


ABCDECBA 


P ROTECTOR 


abcdeefdgfa' 


DISAPPEARED 


ABCDECBAFB 


NEGLIGENCE 


ABCDEEFGCAHB 


INTERRUPTION 


ABCDECCFA 


DISCUSSED 


ABCDEFA 


C ABLEGRA M 


ABCDECDCAFC 


I NTERFERENCE 


ABCDEFA 


AMERICA N 


ABCDECFA 


ENCIRCLE 


ABCDEFA 


C AMOUFLA GE 


ABCDECFA 


EVACUATE 


ABCDEFA 


CHRONIC AL 


ABCDECFBA 


SEAPLANES 


ABCDEFA 


CONFLIC T 


ABCDECFEA 


STANDARDS 


ABCDEFA 


DIS CREPANC Y 


ABCDEDA 


N EWSPAPE R 


ABCDEFA 


S EABORNE 


ABCDEDA 


MARITIM E 


ABCDEFA 


EMPLOYE R 


ABCDEDA 


CO NTRABAN D 


ABCDEFA 


ENCIPHE R 


ABCDEDA 


C OALITIO N 


ABCDEFA 


ENFORCE 


ABCDEDA. 


BA ROMETER 


ABCDEFA 


ENLISTE D 


ABCDEDA 


GY ROMETER 


■ ABCDEFA 


D EPLOYME NT 


ABCDEDA 


HYD ROMETER 


ABCDEFA 


EQUIPME NT 


ABCDEDA 


HYG ROMETER 


ABCDEFA 


FIGHT ERPLANE 


ABCDEDA 


PSYCH ROMETER 


ABCDEFA 


ESCORTE D 


ABCDEDAB 


C ONDITION 


ABCDEFA 


D ESCRIBE 


ABCDEDAC 


REC OGNITION 


ABCDEFA 


J ETPLANE 


ABCDEDAFC 


N EWS PAPERS 


ABCDEFA 


EXCLUDE 


ABCDEDFA 


DICTATED 


ABCDEFA 


INCLUSI VE 


ABCDEDFA 


EXCAVATE 


ABCDEFA'' 


LOGICAL 


ABCDEDFA 


EXHIBITE D 


ABCDEFA 


F ORMATIO N 


ABCDEDFAC 


ANTICIPAT E 


ABCDECA 


T RANSFER 


ABCDEDFAC 


CLEARANCE 


ABCDEFA 


REGULAR 


ABCDEDFACDGB 


ANTICIPATION 


ABCDEFA 


P RISONER 


ABCDEDFCAB 


INTERESTIN G 


ABCDEFA 


SAILORS 


ABCDEDFCGAHB 


INAUGURATION 


ABCDEFA 


SECTORS 


ABCDEDFDA 


ARTIFICIA L 


ABCDEF^ 


SERIOUS LY 


ABCDEDFDEAB 


. C ONSTITUTION 


ABCDECA 


E STABLIS H 


ABCDEDFDGHAIF 


CHRONOLOGICAL 


ABCDgFA 


TONIGHT 


ABCDEDFGA 


PR OCLAMATIO N 


ABF0EFAA 


EMPLOYEE 


ABCDEDFGA 


P RELIMINAR Y 


A2CDEFAAF 


T RANSFERRE D 


ABCDEDFGABHED 


INDETERMINATE 


ABCDEFAAGC 


T RANSFERRIN G 


ABCDEDFGADB 


P RELIMINARIE S 


ABCDEFAB 


INCLUDIN G 


ABCDEDFGHAGD 


ADMINISTRATI VE 


ABCDEFAB 


RADIOGRA M 


ABCDEDFGHAGDIE 


ADMINISTRATION 


ABCDEFAB 


P REMATURE 



r.nitmntnmWTL 




3-35 



REF ID: A5 68 95 



M ISCELLANEOUS PATTERNS— Continued 



ABCDEFABA 


EMPLACEME NT 


ABCDEFBABGHD 


MEASUREMENTS 


ABCDEFAC * 


INTEGRIT Y 


ABCDEFBGA 


ENDURANCE 


ABCDEFAC 


P RISONERS 


ABCDEFBGBA 


DECIPHERED 


ABCDEFACB 


IN TRODUCTOR Y 


ABCDEFCA 


ESTIMATE 


ABCDEFACD , 


ALTERNATE 


ABCDEFCA 


NORTHERN 


ABCDEFACGF 


ALTERNATIN G 


ABCDEFCAB 


ESTIMATES 


ABCDEFAD 


CONTRACT 


ABCDEFCAD 


D OMINATION 


ABCDEFAD 


D ESTROYER ' 


ABCDEFCAGFC 


ESTIMATEDAT 


ABCDEFAD 


INTERVIE W 


ABCDEFCBA 


DETONATED 


ABCDEFAD 


OPERATOR 


ABCDEFCCFA 


DISTRESSED 


ABCDEFAD 


FI RECONTRO L 


ABCDEFCEA 


DISPERSED 


ABCDEFAD 


P ROCEDURE 


ABCDEFCGA 


. ELABORATE 


ABCDEFADB 


D ESTROYERS’ 


ABCDEFDA 


D EPARTURE 


ABCDEFADF 


T RANSVERSE 


ABCDEFDAB 


C USTOMHOUS E 


abcdefae 


D ISCONTIN UE 


ABCDEFDBAB 


INTEKVENIN G 


ABCDEFAEGHEC 


D ISCONTINUANC E 


ABCDEFDBCAGB 


INTERVENTION' 


ABCDEFAF 


EXPANDED 


ABCDEFDEAB 


INTERFERIN G 


ABCDEFAF 


I MPROVEME NT 


ABCDEFDGAB 


DEM ONSTRATION . 


ABCDEFAFCD 


R ADIOSTATIO N 


ABCDEFDGAHCD 


INTERMEDIATE 


ABCDEFAGA 


ENCIPHERE D 


ABCDEFDGHA 


HYDROGRAPH IC 


ABCDEFAGAB ' 


ENFORCEMEN T 


ABCDEFEA 


R EINSTATE 


ABCDEFAGB 


AEROPLANE 


ABCDEFEAB 


F INGERPRIN T 


ABCDEFAGB 


D ETACHMENT 


ABCDEFEAGACE 


R EINSTATEMENT 


ABCDEFAGB 


INFLATION 


ABCDEFEAGDB 


CERTIFICATE 


ABCDEFAGB . 


REINFORCE 


ABCDEFECACD 


THERMOMETER 


ABCDEFAGB 


TRAJECTOR Y 


ABCDEFECAE 


CONFERENCE 


ABCDEFAGBDB 


REIMBURSEME NT 


ABCDEFEDCGCAHB 


‘ INTERPRETATIOl 


ABCDEFAGBHBD 


REINFORCEMEN T 


ABCDEFEFA 


C OMPETITIO N 


ABCDEFAGC 


INTERDICT 


ABCDEFEGA 


D EMOBILIZE 


ABCDEFAGCAHB 


INTERDICTION 


ABCDEFEGA 


C OMPUTATIO N 


ABCDEFAGE 


D EPARTMENT 


ABCDEFFA 


UN DERSTOOD 


ABCDEFAGEC 


D EPARTMENTA L 


ABCDEFFA 


IMPRESSI ON 


ABCDEFAGFD 


REGISTRATI ON 


ABCDEFFAGE 


IMPRESSIVE 


ABCDEFAGHAB 


ENCIPHERMEN T 


ABCDEFFEDAGBC 


INSTALLATIONS 


ABCDEFAGHEBC 


CONFISCATION 


ABCDEFFGAB 


C ONGRESSION AL 


ABCDEFAGHFD 


INVESTIGATE 


ABCDEFGA 


DISARMED 


ABCDEFAGHFAIB 


INVESTIGATION 


ABCDEFGA 


M ECHANIZE D 


ABCDEFAGHFAIBE 


INVESTIGATIONS 


ABCDEFGA 


T ECHNIQUE 


ABCDEFAGHIF 


B REAKTHROUGH 


ABCDEFGA 


R ECOGNIZE 


ABCDEFBA 


DECLARED 


ABCDEFGA 


ENFILADE 


ABCDEFBA 


- DEPARTED 


ABCDEFGA 


EQUALIZE 


ABCDEFBA 


DEPLOYED 


ABCDEFGA 


EQUIPAGE 


ABCDEFBA 


DEPORTED 


ABCDEFGA 


EQUIVALE NT 


ABCDEFBA 


DETACHED 


ABCDEFGA 


D ESIGNATE 


ABCDEFBA 


EMPLOYME NT 


ABCDEFGA 


EXCHANGE 


ABCDEFBA 


ENTRAINE D 


ABCDEFGA 


GROUPING 


ABCDEFBA 


REGISTER 


ABCDEFGA 


GUARDING 


ABCDEFBA 


P ROJECTOR 


ABCDEFGA 1 


INSECURI TY 


ABCDEFBAB 


MEASUREME NT 


ABCDEFGA* 


D IPLOMATI C 




RESTRICTED 



REF ID: A5 68 95 



ABCDEFGA 

ABCDEFGA 

ABCDEFGA 

ABCDEFGA 

ABCDEFGA 

ABCDEFGA 

ABCDEFGA 

ABCDEFGA 

ABCDEFGAB 

ABCDEFGAB 

ABCDEFGAB 

ABCDEFGABF 

ABCDEFGAC 

ABCDEFGAC 

ABCDEFGACB 

ABCDEFGAD 

ABCDEFGAD 

ABCDEFGADG 

ABCDEFGAEHBC 

ABCDEFGAFE 

ABCDEFGAG 

ABCDEFGAHB 

ABCDEFGAHCGIDE 

ABCDEFGBA 

ABCDEFGBA 

ABCDEFGBA 

ABCDEFGBA 

ABCDEFGBA 

ABCDEFGBACAHGD 

ABCDEFGBAE 

ABCDEFGBHA 

ABCDEFGBHIAKC 

ABCDEFGCAG 

ABCDEFGCHEA 

ABCDEFGDAHB 

ABCDEFGDAHBC 

ABCDEFGDBFHA 

ABCDEFGDHAIC 



MISCELLANEOUS 

E NTRUCKIN G j 
NUMBERIN G‘ / 
OBJECTIO N / 

- OPERATIO N , 
SOLDIERS 
DI SPATCHES / 
WITHDRAW / 
WITHDREW 
D ESPATCHES 
U NDERSTAND 
WITHDRAWI NG 
ENLISTMENT 
I NSTRUMENT 
F OUNDATION 
I NSTRUMENTS 
SOUTHEAST 
SOUTHWEST 
SOUTHWESTE RN 
CONSTRUCTION 
IMPRACTICA BLE 
WITHDRAWA L 
'INSPECTION 
RECONSTRUCTION 
DESCRIBED 
DESTROYED 
DETRAINED 
REMAINDER 
TRANSPORT 
TRANSPORTATION 
TRANSPORTS 
ESTABLISHE D 
ESTABLISHMENT 
CONFIDENCE 
RANGEFINDER 
INSTRUCTION 
INSTRUCTIONS 
CE NTRALIZATION 
OBSTRUCTIONS 



PATTERNS— Continued 

ABCDEFGDHFAE 
ABCDEFGEA 
ABCDEFGEHA 
ABCDEFGFABF 
ABCDEFGFAG 
ABCDEFGGAG 
ABCDEFGHA 
ABCDEFGHA 
ABCDEFGHA 
ABCDEFGHA 
ABCDEFGHA'' 
ABCDEFGHA 
ABCDEFGHA 
ABCDEFGHAB 
ABCDEFGHADB 
ABCDEFGHAGC 
ABCDEFGHBA 
ABCDEFGHBA 
ABCDEFGHBIKA 
ABCDEFGHCAEB 
ABCDEFGHCAEB 
ABCDEFGHDAB 
ABCDEFGHDGCA 
ABCDEFGHDIKA 
ABCDEFGHEEHA 
ABCDEFGHFA 
ABCDEFGHFCAG 
ABCDEFGHIA 
ABCDEFGHIA 
ABCDEFGHIA 
ABCDEFGHIA B 
ABCDEFGHIAE 
ABCDEFGHIAF 
ABCDEFGHIDAB 
ABCDEFGHIFKA 
ABCDEFGHIGBA 
ABCDEFGHIJDA 



ORGANIZATION 
H EAVYBOMBE R 
D ESCRIPTIVE 
I NCOMPETENCE 
I NCOMPETENT 
H EAVYLOSSES 
CONSPIRAC Y 
DOMINATED 
C ENTRALIZE 
EXCLUSIVE 
EXPANSIVE 
EXPLOSIVE 
MECHANISM 
C ONSUMPTION 
INFORMATION 
CONVALESCEN T 
DESIGNATED 
DESPATCHED 
DISORGANIZED 
INTRODUCTION 
D ISCREPANCIES 
C ONFIRMATION 
NORTHWESTERN 
REVOLUTIONAR Y 
COUNTERATTAC K 
D EMONSTRATE 
AGRICULTURAL 
DISPATCHED 
OBSERVATIO N 
SUBMARINES 
C ONVERSATION 
C OMPENSATION 
R 0 ADJUNCTION 
C ONSIDERATION 
SEARCHLIGHTS 
DEMONSTRATED 
' SIMULTANEOUS 



' 3-37 



- RESTRICTED 



RESTRICTED 



REF ID : A56895 



& DIGRAPHIC IDIOMORPHS : GENERAL 





AB AB 




-G EN ER 


AL AL 


AR 


NE 


ED ED 




-P RO CE 


ED ED 




-S UC CE 


ED ED 




-D ET RA 


IN IN 


G- 


-L 


IN IN 


G — 


-M 


IN IN 


G- 


OB TA 


IN IN 


G- 


QU 


IN IN 


E- 


RA 


IN IN 


G- 


RE MA 


IN IN 


G- 


SH 


IN IN 


G- 


-T RA 


IN IN 


G- 


CR 


IS IS 




PO SI TI 


ON ON 




-A 


RE RE 


EN 


-A 


SU SU 


AL 


BO 


TH TH 


E- 


WI 


TH TH 


E- 


-P AR 


TI TI 


ON 


RE PE 


TI .TI 


ON 




VI VI 


D- 



AB — AB 



ED 







AB 




AB 






-M 


AI 


NT 


AI 


N- 




RE 


AR 


GU 


AR 


D- 






CH 


UR 


CH 








DE 


Cl 


DE 








DE 


CO 


DE 








DI 


VI 


DI 


NG 




SP 


EA 


RH 


EA 


D- 




-R 


ED 


UC 


ED 




-S 


CH 


ED 


UL 


ED 






-B 


EE 


NN 


EE 


DE 






EM 


BL 


EM 


i 




AM 


EN 


DM 


EN 


T- 


CO 


NT 


EN 


TM 


EN 


T- 


-s 


EV 


EN 


TE 


EN 




-s 


EV 


EN 


TE 


EN 


TH 






EN 


TR 


EN 


CH 






ER 


AS 


ER 





-C 

i 



-I 



-A 

-C 



-T 



HE 

-P 



CA 



-I 



-C 
RE LE 
AT 

-F OR 
NV ES 
ES 
-D ES 
AC 



TH 


ER EF ER 


EN CE 


TH 


ER ES ER 


VE 


WH 


ER EV ER 


- 


AR EL 


ES SN ES 


S- 




GE OR GE 




SC 


HO OL HO 


US E- 


LL UM 


IN AT IN 


G — 




IN CL IN 


E- 


-F IR 


IN GL IN 


E- 


MA 


IN TA IN 




NF AL 


LI BI LI 


TY 


-A 


ME ND ME 


NT 


SO 


ME TI ME 




-0 


NE NI NE 






NO TK NO 


WN 




NO WK NO 


WN 


PP 01 


NT ME NT 




ON TE 


NT ME NT 




-C 


OM PR OM 


IS E- 


-P 


ON TO ON 




-T HR 


OU GH OU 


T- 


-N 


OW KN OW 


N- 




PH OS PH 


OR US 




PO ST PO 


NE 


TR 00 


PS HI PS 




PA 


RA PH RA 


SE 


-P 


RE FE RE! 


[nc E- 




RE FE RE 


i NC E- 



RE 
RE 
RE 
RE 
RO 
SS 
TE 
TH 
TH 
TI 
TI 
TI 
TI 
-H ! . UM 



FO RE 
PA RE 
TI RE 
VE RE 
SS RO 
NE SS 
MP TE 
AT TH 
WI TH 
GA TI 
MA TI 
NA TI 
VI TI 
DR UM 



NT 

AD 

D- 

E- 

ON 

ON 

ON 

ES 



S- 



RESTRICTED 



3-38 




REF ID: A5 68 95 



RESTniOTEB - 

AB AB 







-P 


AN 


AM 


AC 


AN 


AL 










AR 


BI 


TR 


AR 


Y- 










AS 


SO 


ON 


AS 










AC 


CE 


PT 


AN 


CE 












EM 


PL 


AC 


EM 


EN 


T- 


-Q 


UA 


RT 


ER 


MA 


ST 


ER 








-I 


NT 


ER 


PR 


ET 


ER 








-A 


CC 


ES 


SO 


RI 


ES 












IN 


CL 


UD 


IN 


G- 








-D 


IR 


EC 


TF 


IR 


E- 








TO 


MO 


RR 


OW 


MO 


RN 


IN G- 






PA 


NA 


MA 


CA 


NA 


L- 








-I 


NT 


ER 


ME 


NT 










-I 


NT 


ER 


VE 


NT 


10 


N- 






CO 


NT 


IN 


GE 


NT 










-C 


ON 


DI 


TI 


ON 








-T 


OM 


OR 


RO 


WM 


OR 


NI 


NG 








RA 


DI 


OG 


RA 


M- 










RE 


AS 


SU 


RE 










-P 


RE 


MA 


TU 


RE 






-D 


EF 


EN 


SI 


VE 


PO 


SI 


TI 


ON 






IN 


TE 


RD 


IC 


TE 


D- 






QU 


AR 


TE 


RM 


AS 


TE 


R- 








IN 


TE 


RP 


RE 


TE 


R- 








IN 


TE 


RR 


UP 


TE 


D- 






-F 


OR 


TI 


FI 


CA 


TI 


ON 







AB 








AB 






AR 


MO 


RE 


DC 


AR 






EN 


FO 


RC 


EM 


EN 


T- 


RE 


EN 


FO 


RC 


EM 


EN 


TS 




IN 


DE 


TE 


RM 


IN 


AT E- 




IN 


TE 


RE 


ST 


IN 


G- 




IN 


TE 


RF 


ER 


IN 


G- 




IN 


TE 


RV 


EN 


IN 


G- 


-I 


NC 


OM 


PE 


TE 


NC 


E- 


-C 


ON 


GR 


ES 


SI 


ON 


AL 


-D EM 


ON 


ST 


RA 


TI 


ON 




-C 


ON 


SU 


MP 


TI 


ON 






PH 


OT 


OG 


RA 


PH 






TH 


IR 


TE 


EN 


TH 





AB AB 



-I 


NS 


TA 


LL 


AT 


10 


NS 


-C 


ON 


CE 


NT 


RA 


TI 


ON 


-C 


ON 


FL 


AG 


RA 


TI 


ON 


-c 


ON 


SI 


DE 


RA 


TI 


ON 






AB 




AB 


AB 








IN 


CL 


IN 


IN 


G- 




MA 


IN 


TA 


IN 


IN 


G- 




RESTRICTED 



3-39 




REF ID : A56895 



SC 



-B 
-H AW 

-B 
-F 
IN ST 
-P AR 



-B 
-B 
-E MB 
-N 



-A MB 
-I MP 
-M 
-P 



-B 

-R 

IN 

-W 



CO MP 
-E XC 
-E XC 
-E XP 
-I MP 
-P 
PR OP 
-R EP 



G. DIGRAPHIC IDIOMORPHS: PLAYFAIR 



AB BA 



AB 


BA 


RD 










SH 


EL 


LE 


D- 






AF 


FA 


BL 


E- 








-H 


EM 


ME 


DI 


Nr- 




AF 


FA 


IR 










ST 


EM 


ME 


D- 






AG 


GA 


GE 










ST 


EP 


PE 


D- 






AI 


IA 


N- 










AV 


ER 


RE 


D- 






AL 


LA 


RE 


AS 






CO 


NF 


ER 


RE 


D- 






AL 


LA 


ST 






' 


-I 


NT 


ER 


RE 


D- 






AL 


LA 


CY 








-R 


EF 


ER 


RE 


D- 


, 




AL 


LA 


TI 


ON 


S- 




, 




ES 


SE 


NC 


E- 




AL 


LA 


X- 








i 




ES 


SE 


NT 


IA 


L- 


AP 


PA 


RA 


TU 


S- 




AD 


DR 


ES 


SE 


S- 






AP 


PA 


RE 


L- 




-C 


OM 


PR 


ES 


SE 


D- 






AP 


PA 


RE 


NT 






CO 


NF 


ES 


SE 


D- 






AP 


PA 


RE 


NT 


LY 




IM 


PR 


ES 


SE 


D- 






AR 


RA 


NG 


E- 






1 


-L 


ES 


SE 


N- 






AR 


RA 


Y- 










-M 


ES 


SE 


NG 


ER 




AR 


RA 


CK 


S- 








PR 


ES 


SE 


D- 






AR 


RA 


GE 








PR 


OF 


ES 


SE 


D- 






AR 


RA 


SX 


SE 


D- 


-P 


RO 


GR 


ES 


SE 


D- 






AR 


RA 


TI 


ON 






-S 


TR 


ES 


SE 


D- 






AS 


SA 


IL 


AN 


T- 




-S 


TR 


ES 


SE 


S- 






AS 


S A 


UL 


T- 








-V 


ES 


SE 


L- 






AS 


SA 


DO 


R- 






WI 


TN 


ES 


SE 


S- 






AS 


SA 


BL 


E- 








AB 


ET 


TE 


D- 






AS 


SA 


CR 


E- 




-C 


IG 


AR 


ET 


TE 


S- 






AS 


SA 


GE 










-B 


ET 


TE 


R- 






AT 


TA 


CH 










-L 


ET 


TE 


R- 






AT 


TA 


CK 








-E 


IG 


HT 


TH 


RE 


E- 




AT 


TA 


IN 










-R 


IB 


BI 


NG 






AT TA 


LI 


ON 






FO 


RB 


ID 


DI 


NG 






AT 


TA 


N- 










-D 


IF 


FI 


cu 


LT 




BO 


OB 


YT 


RA 


P- 






-B 


IL 


LI 


ON 






DE 


ED 












-F 


IL 


LI 


NG 






EB 


BE 


D- 










-K 


IL 


LI 


NG 






EF 


FE 


CT 










-M 


IL 


LI 


ME 


TE 


R- 


EF 


FE 


CT 


IV 


E- 






-M 


IL 


LI 


NG 






EL 


LE 


D- 










-M 


IL 


LI 


ON 






EL 


LE 


NC 


E- 








SH 


IL 


LI 


NG 






EL 


LE 


NT 










SP 


IL 


LI 


NG 






EL 


LE 


D- 










-T 


IL 


LI 


NG 






EL 


LE 


D- 










-W 


IL 


LI 


AM 






EL 


LE 


T- 










-W 


IL 


LI 


NG 






EL 


LE 


D- 












IM 


MI 


GR 


AN 


T- 


EL 


LE 


D- 












IM 


MI 


GR 


AT 


10 N- 





REF ID: A568 9-5 



AB BA 



AB — BA 







’ 


IM 


MI 


NE 


NT 






PR 


AC 


TI 


CA 


BL 


E- 






SW 


IM 


MI 


NG 








PR 


[AC 


TI 


CA 


L- 






-B 


EG 


IN 


NI 


NG 








-T 


AC 


TI 


CA 


L- 








SP 


IN 


NI 


NG 






-D 


IV 


EB 


OM 


BE 


R- 








-W 


IN 


NI 


NG 










EN 


GI 


NE 


ER 








CL 


IP 


PI 


NG 








-G 


EN 


UI 


NE 










SH 


IP 


Pi 


NG 






-I 


NT 


ER 


FE 


RE 








-S 


TR 


IP 


PI 


NG 






-I 


NT 


ER 


FE 


RE 


NC 


E- 








IR 


RI 


GA 


TI 


ON 


-P 


EN 


ET 


RA 


TE 










-M 


IS 


SI 


NG 








-R 


EV 


OL 


VE 


R- 








-M 


IS 


SI 


ON 










IN 


FI 


NI 


TE 






-A 


DM 


IS 


SI 


ON 








-D 


IS 


PO 


SI 


TI 


ON 






EM 


IS 


SI 


ON 








-S 


IT 


UA 


TI 


ON 








-H 


IS 


SI 


NG 






- 


CA 


NA 


DI 


AN 








PE 


RM 


IS 


SI 


ON 






VE TE 


RI 


NA 


RI 


AN 






TR 


AN 


SM 


IS 


SI 


ON 








NI 


NE 


TE 


EN 










EM 


IT 


TI 


NG 








NI 


NE 


TE 


EN 


TH 








-F 


IT 


TI 


NG 










PE 


RC 


EP 


TI 


ON 




-S 


PL 


IT 


TI 


NG 








-P 


RE 


MI 


ER 








PE 


RM 


IT 


TI 


NG 






-S 


UR 


RE 


ND 


ER 






-A 


FT 


ER 


NO 


ON 








-0 


UR 


SE 


LV 


ES 








FO 


RE 


NO 


ON 








TH 


EM 


SE 


LV 


ES 












NO 


ON 


TI 


ME 






DE 


SE 


RV 


ES 










-F 


OL 


LO 


W- 








RE 


SE 


RV 


ES 










-H 


OL 


LO 


W- 










SE 


RV 


ES 










-C 


OM 


MO 


N- 
























-C 


OM 


MO 


TI 


ON 


















PO 


SI 


TI 


ON 


NO 


RT 


HO 


F- 


















-R 


EC 


ON 


NO 


IT 


ER 
























OP 


PO 


RT 


UN 


E- 






















OP 


PO 


RT 


UN 


IT Y- 






















OP 


PO 


SE 


























OP 


PO 


SI 


TE 
























OP 


PO 


SI 


TI 


ON 




















-C 


OR 


RO 


BO 


RA 


TE 




















-C 


OR 


RO 


DE 






















-T 


OM 


OR 


RO 


W- 
























-B 


OT 


TO 


M- 
























-C 


OT 


TO 


N- 
























CA 


RE 


ER 


























-S 


UC 


CU 


MB 


ED 



















-RESTRICTED" 



REF ID : A56895 



AB 


— 


— 


BA 






AB 


— 


— 


— 


BA 




DE 


BA 


RK 


ED 






DE 


SE 


CR 


AT 


ED 




DE 


CL 


AR 


ED 






DE 


SI 


GN 


AT 


ED 




DE 


FE 


ND 


ED 






DE 


SP 


AT 


CH 


ED 




DE 


MA 


ND 


ED 






EN 


EM 


YP 


LA 


NE 


S- 


DE 


PA 


RT 


ED 




-D 


ET 


ER 


10 


RA 


TE 




DE 


PL 


OY 


ED 




-S 


EV 


EN 


TY 


FI 


VE 




DE 


PO 


RT 


ED 






IR 


RE 


GU 


LA 


RI 


TY 


DE 


SE 


RT 


ED 






NO 


MI 


NA 


TI 


ON 




DE 


TA 


CH 


ED 






SU 


SP 


IC 


10 


US 




EC 


ED 


EN 


CE 


















EM 


PL 


OY 


ME 


NT 


AR — 








— RA 


EN 


TR 


AI 


NE 


D- 


HD — 








— Dn 


ME 


AS 


UR 


EM 


EN T- 


DE MO NS TR AT ED 


NE 


GL 


IG 


EN 


CE 


NO TI FI CA TI ON 


NO 


TA 


TI 


ON 


















PA 


RA 


GR 


AP 


H- 
















RE 


CE 


IV 


ER 


















RE 


CO 


RD 


ER 


















RE 


GI 


ST 


ER 


















RE 


PE 


AT 


ER 


















RE 


PO 


RT 


ER 


















RE 


VO 


LV 


ER 


















RO 


JE 


CT 


OR 


















SE 


MB 


LI 


ES 





















REF ID : A56895 



RESTIUCTE & 



F. DIGRAPHIC IDIOMORPHS : FOUR-SQUARE 1 
( Grouped by number of significant letters in the idiomorphic pattern) 

Two letters 









A- 


A- 










A- 


A- 










A- 




— 


A- 








B 


LO 


CK 


AD 


ED 










SQ 


UA 


DR 


ON 






MO 


VE 


ME 


NT 










I 


NV 


AD 


ED 






FI 


GH 


TE 


RP 


LA 


NE 




E 


MP 


LA 


CE 


ME 


NT 










D 


AM 


AG 


E 






MO 


TO 


RI 


ZE 


D 






PE 


ES 


ON 


NE 


L 








CO 


MM 


AN 


DS 






D EP 


AR 


TU 


RE 








A 


ET 


IL 


LE 


RY 










I 


SL 


AN 


DS 










UN 


US 


UA 


L 




















A 


IR 


PL 


AN 


ES 






















A- 


-- 




~~ 


A- 






E EE 


MY 


PL 


AN 


ES 








A- 




A- 






, 




CO 


MM 


UN 


IC 


AT 


10 


NS 


DE 


SI 


GN 


AT 


ED 






S 


AB 


W 


AG 


E 








CO 


NC 


EN 


TR 


AT 


E 




E 


ST 


IM 


AT 


ED 






D ET 


AC 


HM 


EN 


T 






R 


EO 


EG 


AN 


IZ 


AT 


10 


N 


I 


HD 


IC 


AT 


ED 






H 


AS 


BE 


EN 










LI 


EU 


TE 


NA 


NT 










C 


AV 


AL 


RY 






BA 


TT 


AL 


10 


N 




CO 


NS 


TR 


UC 


TI 


ON 










N 


AV 


AL 








BO 


MB 


•pm 


























P 


RO 


CE 


DU 


RE 






CA 


SU 


AL 


TI 


ES 






A- 






.... 




A- 








ME 


CH 


AN 


IZ 


ED 




CA 


SU 


AL 


TY 








CO 


MM 


IS 


SI 


ON 


ED 






XM 


ME 


DI 


AT 


EL 


Y 




CO 


MB 


AT 














-- 












WI 


TH 


DR 


AW 








CO 


OR 


DI 


NA 


TE 


S 








-B 


-B 










WI 


TH 


DR 


EW 








DI 


RE 


CT 


10 


N 




1 




UN 


AB 


LE 














EM 


ER 


GE 


NC Y 




DI 


SP 


AT 


CH 








OB 


ST 


AC 


LE 








L 


IE 


UT 


EN 


AN 


T 






DI 


UM 


BO 


MB 


ER 










AD 


VA 


NC 


E 










FI 


FT 


EE 


N 




DI 


VE 


BO 


MB 


ER 










AG 


AI 


NS 


T 










FI 


FT 


H 




R OA 


DJ 


UN 


CT 


10 


N 








R 


AI 


LH 


EA 


D 










FI 


FT 


Y 




R 


EP 


LA 


CE 


ME 


NT 






PR 


EP 


AR 


AI 


10 


N 






BR 


ID 


GE 


HE 


AD 




R 


ET 


RE 


AT 










A 


SS 


AU 


LT 












V 


IC 


IN 


IT 


Y 


S 


EV 


ER 


AL 










B 


OM 


BA 


RD 












W 


IT 


HD 


RA 


W 


JU 


NC 


TI 


ON 










A 


IR 


BO 


EN 


E 








A 


DD 


IT 


10 


NA 


L 


CO 


NF 


IR 


MA 


TI 


ON 






S 


EA 


BO 


RN 


E 






A 


MM 


UN 


IT 


10 


N 




I 


NF 


OR 


RA 


TI 


ON 




A 


DV 


AN 


Cl 


NG 










CO 


ND 


IT 


10 


N 




I 


NT 


EL 


LI 


GE 


NC 


E' 






VI 


Cl 


NI 


TY 






RE 


CO 


GN 


IT 


10 


N 






PA 


TR 


OL 






' J 








DE 


TA 


CH 










E 


LE 


ME 


NT 






SA 


BO 


TA 


GE 




. 








DE 


TA 


CH 


ME 


NT 








MI 


LI 


TA 


RY 




SE 


VE 


RE 










H 


AV 


ES 


EE 


N 












MI 


NI 


MU 


M 


AC 


TI 


VI 


TY 










M 


OV 


EM 


EN 


T 












NI 


HT 


H 




A 


TT 


EN 


TI 


ON 












EN 


EM 


Y 










P 


01 


HD 






S 


UC 


CE 


SS 


FU 


LL 


Y 






R 


ES 


ER 


VE 










T 


OM 


OR 


RO 


W 




















R 


ET 


UR 


N 












PO 


NT 


ON 






A- 


— 


-- 


A- 












FL 


AN 


K 












RE 


QU 


ES 


T 




AR 


TI 


IT 


ER 


Y 










FO 


LL 


OW 












RE 


QU 


IR 


E 




AT 


TA 


CK 


ED 








B 


AG 


G/i 


GE 












P 


RI 


SO 


NE 


R 


R 


EE 


NF 


OR 


CE 












HA 


SB 


EE 


N 








RE 


SI 


ST 


AN 


CE 


R 


EE 


NF 


OR 


CE 


ME 


HT 


A PP 


RO 


AC 


HI 


NO 








D 


IS 


PO 


SI 


TI 


ON 






ID 


EN 


TI 


FY 






DE 


BO 


UC 


HI 


NG 












PO 


SI 


TI 


ON 






IM 


PA 


SS 


IB 


LE 




L 


AD 


NC 


HI 


NG 














SO 


UT 


H 


1 




IM 


PO 


SS 


IB 


LE 




I 


MM 


ED 


IA 


TE 


LY 







1 See subpar. , Section IX. 




nEDTRIGTE D 



3-^3 



REOTmCTED 



REF ID : A56895 



Two letters (cont.) 









-B 


-B 










IK 


IT 


LA. 


TE 












F 


IF 


TH 










TE 


RR 


IT 


OR 


Y 










S 


IX 


TY 








M 


IS 


CE 


LL 


AN 


EO 


US 








E 


LE 


VA 


TI 


ON 








E 


LE 


VE 


K 












LI 


AI 


SO 


N 








DA 


MA 


GE 














MO 


RN 


IN 


G 








U 


KU 


SU 


AL 












OB 


JE 


CT 


IV 


E 






C 


OL 


OK 












C 


OL 


ON 


EL 






SU 


PE 


RI 


OR 


IT 


Y 










M 


or 


OR 


IZ 


ED 










OU 


TS 


KI 


RT 


S 




EQ 


UI 


PM 


EN 


T 








A 


VE 


RA 


GE 










B 


AR 


RA 


GE 












AI 


RC 


RA 


FT 






AN 


TI 


AI 


RC 


RA 


FT 












RE 


MA 


IK 






R 


EQ 


UI 


RE 


ME 


NT 








M 


IS 


SI 


KG 









-B -B 

P ER SO m EL 
ES TI HA TE DA T 
P LA. TO ON 
S UP PL Y 
S UP PO RT 
NA VA LB AS E 
F OR WA RD 
WI ND WA RD 







-B 


-- 


-B 






C 


AS 


UA 


IT 


Y 




P 


AT 


RO 


LS 




B AT 


TL 


ES 


HI 


PS 








GE 


HE 


RA 


L 


W 


IL 


LA 


TT 


AC 


•K 


T 


RA 


NS 


MI 


SS 


;io 


.R 


EC 


OG 


NI 


TI 


ON 


T 


RO 


OP 


SH 


IF; 








RE 


GI 


ME 


ht 




CA 


RR 


IE 


RS' 






MI 


SS 


10 


NS 








TW 


EN 


TY 




R 


EQ 


UE 


ST 


ED 





Three letters 





-B 


-- 


— 


-B 








i 


DE 


NT 


IF 


IC 


AT 


10 


N 


M 


EC 


HA 


NI 


ZE 


D 






D 


EP 


LO 


YM 


EN 


T 






M 


ES 


SE 


NG 


ER 








D 


ES 


TR 


OY 


ER 








A 


IR 


SU 


PP 


OR 


T 






V 


IS 


IB 


IL 


IT 


Y 








ME 


SS 


EN 


GE 


R 






I 


MP 


AS 


SI 


BL 


E 






I 


MP 


OS 


SI 


BL 


E 






A 


NT 


IA 


IR 


CR 


AF 


T 




C 


0M 


MA 


ND 


IN 


G 








OP 


ER 


AT 


10 


N 








PR 


IS 


ON 


ER 










PR 


OC 


ED 


UR 


E 








RE 


EN 


FO 


RC 


E 








TR 


AN 


SP 


OR 


TA 


TI 


ON 




YE 


ST 


ER 


DA 


Y 










-B 


_ — 


.... 


— — 


-B 






R 


EC 


OM 


ME 


ND 


ED 








HE 


AV 


YL 


OS 


SE 


S 


R 


EC 


OM 


ME 


HD 


AT 


10 


N 




C 


OM 


MU 


NI 


CA 


TI 


ON 


R 


EC 


ON 


NO 


IT 


ER 


IN 


G 



A- A- A- 


A- A A- 


-B -B -B 


N AV AL BA SE 
R EQ UI SI TI ON 


RE QU ESTE D 


B OM BA RD ME NI' 
EL EM EN TS 
EN GA GE ME NT 




Four letters 




AB A- -B 


A- AB -B 


A- -B A3 


H EA DQ UA RT ER S 


AD DI TI ON AL 


M OR NI NG 


EL EV EN 




P OS TP OH E 


• 


A- AB B , 




AB -B A- 


SO UT HIT ES T 


A- -B -B — A- 


CA NC EL 




RE CO NN 01 TE R 


RE CO NN AI SS AN CE 


A- A- -B -B ; 






W IT HD RA WA L 


A- -B -- AB 


AB -B — A- 




HI TE RD IC T 


AD VA NC ED 


A- A A- A- 




EN EM YT AIT KS 


CO MI AIT DI ITG 


A- -B -- A- -B 






S AT IS FA CT OR Y 


AB — A- -B 


A- A B r 3 




SI OH TI NC- 


RE QU IR EM EN T 


A A- C- C- 






DI SP AT CK ES 




r> 















REF ID : A56895 

s 


HUIUTKIAJ 1 lilD 

A- C- A- C- 


Four letters (cont.) 
-B A- — AB 


-B -D -D -B 


RO AD JU NC TI ON 
-B AB A- 


U NS UC CE SS" FU L 
-B A A- -B 


AI RS UP PO RT 
-B -D D -B 


DI SP OS IT 10 N 
P OS IE 10 N 
PR ES EN T 
RE PR ES EN % 

-B A- AB 


UE DI ,UM BO MB ER 

-BA-'f-BA- 
VI SI BI LI TY 

-B A AB 


IN ST RU C T 10 N 
C ON ST RU CT 10 N 

-B — A- AB 
F IG HE ER PL AN ES 

-B — A AB 

E ST AB LI SH ME NE 

-B B A- A- 

EN CO UN TE RE D 

-B B -D -D 

RE IN FO RC EM EN T 


RE PE AT ED 

-B A- A- -B 


IN FO m AT 10 N 
~B A- A- -B 


DE ST RO YE R 
-B A- -B — A- 


IN' ST AL IA TI ON 
-B -D -B D 


UN ID EN TI FI ED 


CR OS SR OA DS 




/ 

Five letters 




A- -B AB B 


-B A- A AB 


-B -D D -B -D 


NA VA LA TT AC K 


DI ST RI BU TI OH 


IN ST RU CT 10 NS 


A- -B B AB 


-B A- -B AB 




R EC ON NA IS SA NC E 


RE PL AC EM EN T 

i 





Six letters 



AB CB C- A- | A- A- -B AB A- | A CB A CB 

RE QU IS IT 10 N " ' 

A- CB — A- CB 

C ON DI TI ON Q UA RT ER MA ST ER A DM Hi IS TR AT IV E 

RA DI OG RA M 

A- CB — CB A- 
SC HO OL HO US E 



ID EN TI FI CA TI ON 
-B AE AD -D 



P OS IT 10 NS 
AB -D -D AB 




3-45 






























CONFIDENTIAL 



REF ID : A56895 



APPERDIX 10 

COJTOfllCATIOB IffriCLLIGEtlCE 0EEHATI01TS 



I 



Paragraph 

Communication intelligence pi'ocessea 

Intox*cej)tio», radio direction finding, and radio position finding.*. 

Radio fingerprinting and Morse operator analysis 

Traffic analysis 

Cx'yptanalysis 

Other intelligence sources 

Time needed for cryptanalysis and its dependent factors. 

Ciryptanalytlc records and reports 

Illustrative example of a technical report 

1 . Communication intelligence processes . The principal processes 
of communication intelligence operations are as follows: 



a. Interception of communication signals or messages and forward- 
ing raw traffic^ to communication intelligence centers for study* 



h. Radio direction finding and radio position finding operations; 
Identification of transmitters and radio operators by means of radio 
fingerprinting and Morse operatox' analysis, respectively. 



c. Traffic analysis, or the study of the external characteristics 
of communications , without recourse to cryptanalysis of the message 
texts . 



d. Cryptanalysis or solution of the texts of messages. 

e. Translation and emendation of the message texts. 

f . large-scale production or exploitation of communication intel- 
ligence, after the Initial break-in. 



g. Evaluation of information, yielding military intelligence. 

, h. Collation, correlation and comparison of communication intel- 
ligence with other intelligence sources. 



i . Distribution of communication. intelligence to consumers . 



2. Interception, radio direction finding, and radio position find - 
ing . --a . Messages transmitted by radio can be manually copied or auto- 
matically recorded by suitably adjusted radio apparatus located within 
range of the transmitter. Some messages transmitted over wire lines 
can likewise be manually copied or automatically recorded by special 
apparatus suited for the purpose. Correspondents have no way of know- 
ing whether or not radio transmissions are being copied by the enemy, 
since the interception does not interfere in the slightest degree j with 

4 

1 haw traffic is unprocessed intercepted traffic . 



CONFIDENTIAL 



10-1 



(Appendix to NS A text, "Military 
Crypt analytics, Parti", Dec 1952) 



vo CO-<3 cvvn 4=-W ro H 



CONFIDENTIAL REF ID : A56895 



signals being transmitted. Interception of wire traffic is much more 
difficult than of radio, mainly because the equipment either must be 
located very near the wire line, or connected directly to it. 

b. It is possible to determine, with a fair degree of accuracy, 
the direction of a radio transmitter from a given location and, by estab- 
lishing the direction from two or more locations, it is possible to deter- 
mine the geographical location of the transmitter. The science which 
deals with the means and methods of determining the direction in which a 
radio transmitter lies is called radio direction finding ; the method of 
determining the geographical location of a radio trar emitter, by the use 
of two or more direction-finding installations , is called radio position 
finding. 

3 . Radio fingerprinting and Morse operator analysis . — a . Radio 
fingerprinting is one of the valuable adjuncts of signal analysis, a 
communications -engineering sister of traffic analysis. Radio finger- 
printing consists of the analysis of the characteristics of the emissions 
of an individual radio transmitter by means of oscillograms of the emit- 
ted radio waves . The oscillograms of the emissions of unidentified radio 
stations are compared with those of known transmitters or radio stations, 
and thus it is possible to equate different call signs or different fre- 
quencies which have been used by the same transmitting station. Radio 
fingerprinting is normally not considered conclusive in itself, but is 
correlated with other analyses or confirmations . 

b. Another valuable adjunct of communication intelligence operations 
is Morse operator analysis . This analysis deals with the radio operators' 
characteristics when hand-sending is used; the analysis is based on the 
relative lengths and spacing of the dots and dashes composing the various 
Morse characters . It is a rarity when a radio operator will transmit 
a Morse character perfectly, i.e., moke the dashes the correct length 
in respect to the dots, without any individuality (known as the "fist" 
or "swing") in the sending. Most operators do have certain individual 
characteristics or tendencies in the sending of certain Morse characters. 
In past decades, radio operators have identified characteristic "fists" 
of other operators based on the aural recognition of the rhythm of cer- 
tain Morse characters . This art has been made more scientific through 
the use of actual physical measurement and through the assignment of a 
classificatory coding to the individualities present in the undulator- 
tape recording^ of a Morse transmission. By matching measurements, indi- 
vidual radio operators may be identified, in spite of changes of call 
signs and other elements of the transmission. 

U ♦ Traffic Analys is . — a . A great deal of information of military 
value can be obtained by studying signal communications without solving 
encrypted messages constituting the traffic . The procedure and the meth- 
ods used have yielded results of sufficient importance to warrant the 



^ Such recordings take the form of a wavy inked line on a paper tape, 
being a visual representation of the dots and dashes as transmitted. 



CONFIDENTIAL 



10-2 



CONFIDENTIAL 



REF ID: A5 68 95 



application of a special tem to this field of study; namely', traffic 
analysis , which is the study of signal coxmnunications and intercepted or 
monitored traffic for the purpose of gathering military information with 
out recourse to cryptanalysis . 

I 

b. In general terms, traffic analysis is the careful inspection 
and study of signal communications for the purpose of penetrating cam- 
ouflage superimposed upon the communication network for purposes of 
security . Specifically, traffic analysis reconstructs radio communica- 
tion networks by: (l) noting volume, direction, and routing of messages 

(2) correlating transmission frequencies and schedules used among and 
within the various networks; (3) determining directions in which trans- 
mitters lie, by means of radio direction finding; (h) locating trans- 
mitters geographically, by radio position finding; (5) developing the 
system of assigning and changing radio call signs; and (6) studying all 
items that constitute messages originated by operators and exchanged 
among themselves on a radio net. 

/ 

< 2 . From a correlation of general and specific information derived 
by means of the foregoing procedures, traffic analysis is able not only 
to ascertain the geographic location and disposition of troop3 and mili- 
tary units (technically called "Order of Battle") and important troop 
movements, but also to predict with a fair degree of reliability the 
areas and extent of Inuaedintely pending or future activities . Traffic 
analysis procedures are followed to obtain information of value con-’ 
cerning the enemy, and to determine what information concerning our 
own forces is made available to the enemy through our own signal com- 
munications . Specifically, enemy military plans and operations may be 
revealed as follows: 

(1) Unit movements and preparations for military activity my be 
indicated by rising and falling traffic volumes and changes in the 
structure of the network. 

(2) The military function of a network may be revealed by the 
characteristic traffic pattern which results from transmissions inci- 
dental to planning, supply, or transportation. 

(3) Change of grouping, disposition of forces and fleets, and 
probable tactical developments may be manifested in the redeployment 
of the radio stations which serve military elements. 

d. These very important results are obtained without actually 
reading the texts of the intercepted messages; the solution and trans- 
lation of messages are the functions of cryptanalysis and not traffic 
analysis. However, the cryptanalyst is frequently able to make good 
use of bits of information disclosed by traffic analysis such as faults 
noted in message routing and errors in cryptography causing messages 
to be duplicated or canceled. Cryptanalysis can provide important 



J Such operators ' communications are termed "chatter" or simply 
h chat ." 



CONFIDENTIAL 



10-3 



CONFIDENTIAL 



REF ID: A5 68 95 



information for traffic analysis, since the solution of messages often 
yields data on impending changes in signal communication plans, opera- 
ting frequencies and schedules, etc. Cryptanalysis also yields data 
on specific channels, networks, or circuits which are most productive 
of intelligence, so that effective control and direction of intercept 
agencies for maximum results can be achieved. 

2 . Cryptanalysis ♦ The most important steps of practical, opera- 
tional cryptanalysis are listed below. These steps are more or less in 
the order in which they are followed, but in particular cases some of 
these steps may be interchanged, or omitted entirely. 

a. The study of patent characteristics of message texts. 

b . The study of any available collateral information, including 
that obtained from previous solutions . 

c . The search for and study of indicators . 

d. The determination of the type of cryptosystem used. 

e. The separation of the traffic into groups of messages in the 
same or related keys . 

f . The search for repetitions within and between messages. 

g. The study of the beginnings and endings of messages. 

h . The preparation of statistical counts of letters , groups , etc . 

i . The reduction of the encrypted texts to simplest terms . 

. The test for probable words , stereotypes , isologs , etc . 

k . The recovery of the plain texts . 

6 . Other Intelligence Sources . In addition to (l) traffic analysis 
and (2) cryptanalysis as means of obtaining information relating to com- 
munications, further data my be obtained (3) by the use of secret agents 
for espionage, (4) by the capture and interrogation of prisoners, (5) by 
the capture of headquarters or command posts with records more or less 
intact, and (6) by defection or carelessness on the part of personnel who 
handle communications. Of these six main sources, traffic analysis and 
cryptanalysis are the most valuable, due in great part to their reliabil- 
ity; they may be likened to "reading the innermost thoughts of the enemy' 1 
The amount of vital information they furnish cannot be accurately esti- 
mated as it fluctuates with time, place, circumstances, equipment, and 
personnel. For most effective operation, the results of both cryptanal- 
ysis and traffic analysis can be fitted together to yield a unified 
picture of the communications scheme. Therefore, if all transmitting 



■ CONFIDENTIAL 



10-U 




CONFIDENTIAL 



REF ID : A56895 



stations can "be located quickly and If all communications can "be inter- 
cepted and solved, extremely valuable information concerning strength, 
disposition of forces , and proposed moves will be continually available. 

7 . Time needed for cryptanalysis and Its dependent factors .-- 

a. In military operations time is a vital element. The influence 
or effect that analysis of military cryptograms may have on the tactical 
situation depends on various time factors. 

b. Of these factors, the following are the most important: 

(1) The length of time necessary to transmit intercepted enemy 
cryptograms to solving headquarters . This factor is negligible only 
when signal communication agencies are properly and specifically 
organized to perform this function. 

(2) The 3.ength of time required to organize raw materials, to make 
traffic analysis studies and to solve the cryptograms , and the time re- 
quired to make copies, tabulate, and record data. 

(3) The nature of Information disclosed by traffic analysis studies 
and solved cryptograms; whether it is of immediate or operational impor- 
tance in impending action, or whether it is of historical Interest only 
in connection with past action. 

(k) The length of time necessary to transmit information to the 
organization or bureau responsible for evaluating the information. 

Only after information has been evaluated and correlated with informa- 
tion from other sources does it become Intelligence . 

(5) The length of time necessary to transmit the resulting intelli- 
gence (military, naval, air, etc.) to the agency or agencies responsible 
for tactical operations, and the length of time necessary for the agency 
to prepare orders for the action determined by the intelligence and to 
transmit such orders to the combat units concerned. The last sentence 
under (l) above applies here also. 

£. Of the factors mentioned in b above, the only one of direct 
interest in this text is the length of time required to solve the crypto 
grams . This is subject to great variation, dependent upon other factors 
of which the following are the most important: 

(l) The degree of resistance of the system to cryptanalytie attack. 
This is dependent upon the technical soundness of the system itself, the 
technical soundness of the regulations and procedures governing the use 
of the system, and the extent to which cipher clerks follow these regu- 
lations and procedures . 



k 

Often referred to as f inished intelligence . 



CONFIDENTIAL 



10-5 



CONFIDENTIAL 



REF ID : A56895 



(2) The volume of cryptographic text available for study. As a 
rule, the greater the volume of text, the more easily and speedily it 
can be solved. A single cryptogram in a given system may present an 
almost hopeless task for the cryptanalyst, but if many cryptograms of 
the same system or in the same or closely related specific keys are 
available for study, the solution may be reached in a very short time . 

(3) The number, skill, and efficiency of organization and coopera- 
tion of communication intelligence unit3 assigned to the -work. Crypt- 
analytic units range in size from a comparatively few persons in the 
forward echelons to many persons In the rear echelons . Such organization 
avoids duplication of effort and, especially in forward areas where spot 
intelligence is most useful, makes possible the quick interpretation of ' 
cryptograms in already solved systems . In all these units , proper organ- 
ization of highly skilled workers is essential for efficient operation. 

(4) The amount and character of collateral information and intelli- 
gence available to the cryptanalytic organization. Isolated cryptograms, 
exchanged between a restricted, small group of correspondents about whom 
and whose business no information is available may resist the efforts of 
even a highly organized, skilled cryptanalytic organization indefinitely. 
If, however, a certain amount of such information is obtained, the situ- 
ation aiay be entirely changed. In military operations usually a great 
deal of collateral, information is available, from sources indicated in 
paragraph 6, above. As a rule, a fair amount of definite information 
concerning specific cryptograms is at hand, such as proper names of per- 
sons and places, and events in the immediate past or future. ^ Although 
the exchange of information between intelligence and cryptauzly s.V* staffs 
is very important, the collection of information derived from an inten- 
sive study of already solved traffic is equally as important because It 
yields extremely valuable cryptanalytic intelligence which greatly facil- 
itates the solution of new cryptograms from the same sources . 

6 . Cryptanalytic records and reports . — a. In practical cryptana- 
lytic work the systematization of records and the maintenance of adequate 
files are of considerable importance. Likewise, the preparation of clear 
and concise reports, both technical and non-technical, is a major facet 
of practical cryptanalytic operations . 



b . All messages coming into the cryptanalytic section are assigned 
a reference number, and a log is kept of these raessages showing pertinent 
data such as the call signs, the date and time of interception, the group 
count, etc. Duplicate messages (i.e., different intercepts of the same 
transmission, or intercepts of retransmissions of the same message) are 
stapled together and garbles are corrected. Other records and files are 
maintained for special studies; for example, there may be card files on 



In this connection, see the remarks on cribs and probable words in 
subpars . 2d and 49c . 



CONFIDENTIAL 



10-6 




CONFIDENTIAL 



REF ID: A5 68 95 



the message indicators^ that have appeared in the traffic, card files of 
keys used in past and current systems, etc. 

c. Cryptanalytic reports fall into two main categories: (a) tech- 

nical reports intended for cryptanalytic personnel designed to give a 
summary of the cryptographic features of a system, with the steps that 
were taken to diagnose the system and effect a solution} and (h) non- 
technical reports destined for intelligence consumers?, which reports 
consist for the most part of message decrypts . In the latter category 
all decrypts might he furnished verbatim, or complete decrypts of impor- 
tant messages only, the rest of the messages being furnished in "gists" 
or in condensed form. 

O 

d. In technical reporting, clarity and detail are paramount. A 
complete resume of the diagnostic techniques employed in the identifica- 
tion of the system should be included, as well as a comprehensive outline 
of the steps taken to arrive at the initial solution. ° it goes without 
saying that close attention should be paid to precise cryptologic termi- 
nology in all descriptions of methods and techniques, so as to lessen 
the chance of ambiguity or possible misunderstanding on the part of the 
reader . A cryptologic glossary should he freely consulted in all cases 
where there is an element of doubt in the mind of a writer as to the ex- 
act meaning of a term he is about to use . 

e . In the next paragraph there is found an example of what may be 
considered as typical of a cryptanalytic technical report. Of course 
there is no fixed standard format for such a report, as the particular 
way in which a report is prepared, and the information included therein, 
depends upon the circumstances and situation at the time of the report. 
However, the hypothetical report in the next paragraph is intended as il- 
lustrative of the amount of detail that might be included in a report of 
this nature. 

, ... 

In this connection, the location of groups of a message is desig- 
nated by the terms Al, A2, A3 — if reference is made to the first, second 
third. . .positions from the beginning of the encrypted text, and by the 
terms Uf, Zl, Z2...if reference is made to the last, penultimate, ante- 
penultimate . . .positions from the end of the encrypted text . 

? These reports are Invariably highly classified, and their dissemina- 
tion is strictly controlled on a special distribution list of those who 
must have a "need-to-know." This limitation is absolutely essential in 
order to protect the information, and prevent drying up the source and • 
negating the work of the many weeks, months, or even years that are repre 
sented by the fruits of the communication intelligence effort. In this 
latter connection, when Information derived through communication Intel- 
ligence efforts is included in military intelligence reports, it is dis- 
guised in such a way as to protect the source of the information. 

o 

° For an excellent exposition on the art of technical writing, see 
Joseph N. 'Ulman, Jr., Technical Reporting , Eew York, 1952. 

9 See also the remarks made in subpar. 47f , on pp. 94-95 • 



CONFIDENTIAL 



10-7 



CONFIDENTIAL 



REF ID : A56895 



9. Illustrative example of a technical report . The following repre- 
sents a hypothetical technical report on the cryptanalysis of a newly- 
encountered system: 

(CLASSIFICATION) 

Special Distribution 



REPORT ON THE SOLUTION 
OF THE "CALOX " SYSTEM 

5 January 19 



Copy No. 

of copies 



I - BACKGROUN D 

1. On 12 December 19 , a new discriinmant.CALOX, appeared in the enemy’s 

traffic. The discriminant appears in the usual position, the A1 group of the message. 

2. Traffic analysis indicates that CALOX traffic is being passed on air defense 
nets. From the characteristics of the transmission of this traffic and associated procedures, 
it appears that CALOX is an administrative system rather than an operational system. It 
also appears that CALOX does not replace an existing system, but rather is a new system 
introduced for some special purpose. On the enemy's air defense nets, both cipher and 
code systems have been encountered. 

3. CALOX traffic was segregated and logged in as received, together with the 
worksheet reference numbers assigned to all incoming traffic by the Traffic Handling 
Section. 

II - PRE L IMINARY A NALYSIS 

4. The first step in treating the CALOX system was to complete the plain -component 
sequence on one of the messages, on the hypothesis of direct and reversed standard alphabets, 
using a strip board for this purpose. (The enemy has used standard alphabets in the past in 
one system, changing the juxtaposition of the components after the encryption of every few 
letters. ) This disclosed nothing of significance. 

5. Uniliteral frequency distributions made for each of the six messages intercepted 
on 12 December were flat; the average LC. of 1. 1 indicates that it is most unlikely that 
the underlying cryptosystem is a mono alphabetic system involving single -letter cipher units. 
However, a rather odd manifestation in the distributions for each message was that C c , Dc, 
H c , L c , and Vc were usually consistently predominating, while S c , Yc t and Zc were con- 
sistently of very low frequency. No explanation for this phenomenon was forthcoming at 
the time. 

6. A check was made on previously solved enemy systems used on his air defense 
and other nets, to disclose any similarity between the CALOX characteristics and those 

of another system; this proved fruitless, as the uniliteral frequency manifestations of CALOX 
were unique to that system. A check was also made to find any possible isologs between 
CALOX messages and those of another readable system; however, this too proved fruitless, 
as did the examination of chatter associated with the CALOX messages in an attempt to 
reveal any clues as to the system or to uncover possible cryptographic service messages, etc. 



10-8 



CONFIDENTIAL 




REF ID: A56895 



COMFIDEMTlA t r 



7. Digraphic distributions were made of the messages of 12 December, but no 
unusual phenomena were visible* The approached dial of {$ , and there was no 
evidence to suppoit any matching of the rows or columns of the distributions if the 
hypothesis of a variant system with a small matrix were assumed. 

8. Triliteral frequency distributions were made of each message to disclose 
repetitions; these repetitions were undcilined in the messages, and a comparison was 
made of those repetitions occurring between messages of the same day. Many short 
repetitions of 3, 4 f and 5 letters were disclosed, the number of these repetitions 
being considerably above that expected for random; however, no longer repetitions 
were uncovered, and the intervals between the repetitions had no common factors. 



9. Every day's accumulation of traffic was examined statistically with a view 
to revealing possible key changes, and the phenomena in par. 5, above, continued. 
When on 19 December the predominant peaks and troughs no longer corresponded to 
the norms observed m par. 5, a change of keys was assumed. 

10. A typical message in the first key period is given below; 



LRZ DE CKS (Intercepted 17 December, on a frequency of 5600 Kcs) 



CALOX JOLDJ JLAPP DREEF QXEDZ 
OMMYE HQDAH YEMNB VUGHD 3MXOG 
FRILM UGBOC DEXJL UBWW TRAFX 
DIKQW MCGIW* HRMAF EKGEE FNPOG 
TJXAN BLTUR KOTOR CFIH7 QGEKH 
LAXVY HEQBX RIKRK YACSV LPOQP 
DKIQC MRADN VNUKB TOPBH L±KLH 
ODMXT DHONG XHXEL BWXGA LDIGB 
in - THE SOLUTION 



QIHFN WMGUH DMAYM IMNDY OMZCC 
LDHUX MACJV VRNEK LCHEJ DZCDO 
LKNPA HSJNE HVCAC OQTHU FJVTH 
JEOGM WGUDM XJIJL BWEPK QCUMR 
HUJNQ ATBWZ VHERI LHFOQ MLUMX 
NOBKU XGLED FHPAG JRRAB JLEBW 
EFVTR BGYMA MYQWI FVLEM GLEGH 
GCIIM ZQLAC LXODQ 



11. The following peculiar sets of similar sequences of cipher letters were 
noted during the examination of the 32 messages available in the first key period. The 
message reference numbers are given, together with the position in the message of the 
first letter of the sequence. (The position given is die text position, excluding the 
discriminant. ) 



Msg No . Pos. 

a) 60208 057 

61492 216 

60317 139 



HFIJVTHODK 
HFJV OTHDKQ 
HUFJVTHDIK 



QWMEC GAWHR 
AWMEC GWHAR 
QWMCGIWHR 



C ONFIDENTIAL 



10-9 



CONFIDENTIAL 














REF 


ID 


* 

m * 


A56895 


b) 


60317 


123 


N 


P 


A 


H 


S 


J 


N 


E 


H 


V 


c 


A 


C 


Q T 




62350 


098 


N 


P 


H 


I 


S 


J 


N 


0 


H 


V 


c 


C 


U 


Q T 


C) 


60317 


184 


J 


L 


B 


W 


E 


D 


K 


Q 


C 


U 


M 


R 








60317 


291 


J 


L 


E 


B 


W 


D 


K 


I 


Q 


C 


M 


R 






d) 


60295 


114 


T 


P 


I 


Q 


K 


Z 


H 


E 


H 


V 


P 


U 


V 


P B 




61007 


253 


T 


P 


0 


Q 


K 


Z 


H 


A 


H 


V 


P 


E 


V 


P B 


e) 


60943 


147 


H 


V 


G 


G 


A 


K 


W 


Q 


S 


0 


V 


R 


N 






62156 


064 


H 


V 


U 


G 


G 


K 


E 


w 


Q 


s 


V 


I 


R 


N 



The behavior of the letters comprising these sequences indicates that A c , Ec, Ic, 0 C| and U c , 
most likely are nulls. On this hypothesis, evidence from the lengths of the repetitions now 
disclosed, and the intervals between repetitions, indicates a digraphic grouping of the cipher 
text. On checking back to the digraphic distributions, it is noted that there are no vowel- 
vowel contacts in the cipher text, except for combinations with Y c . Furthermore, in retrospect 
it is seen that most of the cipher groups contain l'or 2 vowels, never more; this significance 
escaped notice until the near-repetitions above were observed. 

12. New digraphic distributions, omitting the 5 vowels, were made for the messages 
in the first key period. No matching qualities were manifested in die new distributions; but 
this time the (J>2 very closely approximated the ^ ti lus it appeared that, in spite of the limi- 
tation of only 21 ciphertext letters remaining after the null vowels were discarded, the system 
was basically a digraphic system. (This would not exclude, however, a matrix containing a 
few frequent trigraphs or tetragraphs, etc. ) Work sheets were now made for several of the 
best messages from the first key period, the messages selected being long ones that existed in 
more than one intercept copy so that garbles might be corrected. 

13. On 28 December the first message was solved; this was Message #60317 which 
was one of the longest, and which was copied by three different intercept operators. One 
more cryptographic idiosyncrasy of the CALOX system was now brought to light; that of 
the peculiarity of behavior of Y c which had been previously overlooked. This peculiarity 
was that Y c was always present in pairs, fairly close together; every Y Q was followed by 
another Y , with from 2 to 10 letters intervening. This Y c turned out to be a number 
indicator, and the cipher digraphs between the indicators represented single digits. 

14. From the original solution, an equivalent digraphic matrix was reconstructed 
with the consonant coordinates in normal alphabetical order, as shown below; 



10-10 



CONFIDEN Tt A fc 



REF ID: A5 68 95 




C ONFIDENTIAL 

2d Letter 




Noting evidences of symmetry in the matrix, the matrix coordinates were rearranged to yield 
the primary matrix which is shown below, including values which were interpolated on the 
basis of likelihood and alphabetical sequence. 



2d Letter 





9 


C 


K 


X 


S 


D 


M 


Z 


T 


F 


P 


N 


G 


R 


B 


H 


V 


L 


J 


W 


H 


A1 


AA 


AB 


AC 


AD 


AE 


AF 


AG 


AH 


AI 


AK 


AL 


AM 


AN 


AO 


AP 


AR 


AS 


AT 


AU 


B 


AV 


m 


AY 


B2 


BA 


BE 


BI 


BL 


BO 


BR 


BS 


BU 


BY 


C3 


CA 


CC 


CE 


CH 


Cl 


CK 


M 


CL 


CO 


CR 


CT 


CU 


CY 


Db 


DA 


DB 


DC 


DD 


DE 


DF 


DG 


DH 


DI 


DL 


DM 


DN 


DO 


T 


DP 


DQ 


DR 


DS 


DT 


DU 


DV 


DW 


DY 


E5 


EA 


EB 


EC 


ED 


EE 


EF 


EG 


EH 


El 


EK 


D 


EL 


EM 


EN 


EO 


EP 


EQ 


ER 


ES 


ET 


EU 


EV 


EW 


EX 


EY 


EZ 


f6 


FA 




FE 


FF 


F 


FI 


FL 


FO 


FR 


FS 


FT 


FU 




FY 


G7 


GA 


GE 


GF 


GH 


GI 


GL 


GM 


GN 


GO 


GP 


N 


GR 


GS 


GT 


GU 


GY 


H8 


HA 


HB 


HC 


HD 


HE 




HI 
















m 
























IL 


IM 


IN 


10 


IP 


IR 


IS 


IT 


IV 


R 


IW 


IX 


Jj£ 


JA 


JE 


JO 


JU 


K 


KA 


KE 


KI 


KO 


L 


LA 


LB 


LC 


LD 


LE 


IF 


LH 


G 


LI 


LL 


IM 


IN 


LO 


LP 


LR 


IB 


LT 


LU 


LV 


LW 


LY 


M 


MA 


MB 




ME 


MI 


MM 


P 


MO 


MP 


MR 


MS 


MT 


MU 


MY 


N 


NA 


NB 


NC 


ND 


NE 


NF 


NG 


NH 


NI 


NL 


NM 


NN 


W 


NO 


NP 


NQ 


NR 


NS 


NT 


NU 


NV 


NW 


NY 


0 


OA 


OB 


OC 


OD 


OE 


OF 


OG 


OH 


01 


L 


OK 


OL 


OM 


ON 


00 


OP 


OR 


OS 


OT 


OU 


OF 


OW 


OX 


OY 


P 


PA 










J 






















Q 


QU 


R 


RA 


RB 


RC 


RD 


RE 


RF 


RG 


Q 


RH 


RI 


RL 


RM 


RN 


RO 


RP 


RQ 


RR 


RS 


RT 


RU 




RY 


S 


SA 


SB 


SC 


SD 


SE 


X 


SF 


SG 


SH 


SI 


SL 


SM 


SN 


SO 


SP 


SQ 


SR 


SS 


ST 


SU 


SW 


SY 


T 


TA 


TB 


TC 


C 


TD 


TE 


TF 


TG 


TH 


TI 


TL 


TM 


TN 


TO 






















K 

<3 














UL 


















VE 










z 


YC 









































By comparison with other messages in the same period, and with messages in subsequent 
periods, it was possible to recover the values inside the matrix in their entirety, as follows: 



10-11 



CONFIDENTIAL 










CONFIDENTIAL 



REF ID : A56895 



A 


AA 


AB 


AC 


AD 


AE 


AF 


AG 


AH 


AI 


AK 


AL 


AM 


AN 


AO 


AP 


AR 


AS 


AT 


AU 


AV 


AW 


AY 


B 


BA 


BE 


BI 


BL 


BO 


BR 


BT 


BU 


BY 


C 


CA 


CC 


CE 


CH 


Cl 


CK 


CL 


CO 


CR 


CT 


CU 


CY 


t> 


DA 


DB 


DC 


DD 


DE 


DF 


DG 


DH 


Dl 


DL 


DM 


DN 


DO 


DP 


DQ 


DR 


DS 


DT 


DU 


DV 


DW 


DY 


E 


EA 


EB 


EC 


ED 


EE 


EF 


EG 


EH 


El 


EJ 


EL 


EM 


EN 


EO 


EP 


EQ 


ER 


ES 


ET 


EU 


EV 


EW 


EX 


EY 


EZ 


F 


FA 


FC 


FE 


FF 


FI 


FL 


FO 


FR 


FS 


FT 


FU 


FY 


G 


GA 


GC 


GE 


GF 


GG 


GH 


GI 


GL 


GN 


GO 


GP 


GR 


GS 


GT 


GU 


GW 


H 


HA 


HB 


HC 


HD 


HE 


HF 


HI 


HL 


HM 


HN 


HO 


HR 


HS 


HT 


HU 


HY 


i 


IA 


IB 


IC 


ID 


IE 


IF 


IG 


IK 


IL 


IM 


IN 


10 


IP 


IR 


IS 


IT 


IV 


IX 


IZ 


J 


JA 


JE 


JO 


JU 


K 


KA 


KE 


KI 


KS 


L 


LA 


LB 


LC 


LD 


LE 


LF 


LG 


LI 


LL 


LM 


LN 


LO 


LP 


LR 


LS 


LT 


LU 


LV 


LW 


LY 


M 


MA 


MB 


KC 


ME 


MI 


MM 


MO 


MP 


MR 


MS 


MT 


MU 


MY 


N 


NA 


NB 


NC 


ND 


NE 


NF 


NG 


NH 


MI 


NK 


HL 


NM 


NN 


NO 


NP 


NR 


NS 


NT 


NU 


NV 


NW 


NY 


0 


OA 


OB 


OC 


OD 


OE 


OF 


OG 


OH 


01 


OK 


OL 


OM 


ON 


00 


OP 


OR 


OS 


or 


OU 


ov 


OW 


OX 


OY 


P 


PA 


PE 


PF 


PH 


PI 


PL 


PM 


PN 


PO 


PP 


PR 


PS 


FT 


PU 


PY 


Q 


QU 


R 


RA 


R3 


RC 


RD 


RE 


RF 


RG 


RH 


RI 


RL 


RM 


RN 


RO 


RP 


RR 


RS 


RT 


RU 


RV 


RW 


RY 


S 


SA 


SB 


SC 


SD 


SE 


SF 


SG 


SH 


SI 


SK 


SL 


SM 


SN 


SO 


SP 


SR 


SS 


ST 


SU 


SW 


SY 


T 


TA 


TB 


TC 


TD 


TE 


TF 


TG 


TH 


TI 


TL 


TM 


TN 


TO 


TP 


TR 


TS 


TT 


TU 


TW 


TY 


TZ 


U 


UA 


UB 


UC 


UD 


UE 


UG 


UI 


UL 


UM 


UN 


UP 


UR 


US 


UT 


V 


VA 


VE 


VI 


VO 


W 


WA 


WE 


WH 


WI 


WL 


WN 


WO 


WR 


WY 


X 


XA 


XC 


XE 


XF 


XI 


XN 


XP 


XT 


Y 


YA 


YB 


YC 


YD 


YE 


YF 


YG 


YH 


YI 


YL 


YM 


YN 


YO 


YP 


YR 


YS 


YT 


YW 


Z 


ZA 


ZE 


ZI 



It will be noted that the matrix contains the 26 letters, and 374 of the highest frequency 
digraphs. When encrypting numbers, the cipher value for 1 is the cipher equivalent of 
Ap , the cipher value for 2 is the 66 c for Bp, etc. , to 0p = 09 c (Jp). 

15. In the matrix coordinates for the first key period, the non- random pheno- 
mena in the grouping of the coordinate letters was noticed, suggesting that some 
systematic method for producing these sequences was used. It evolved that these se - 
quences were derived by simple columnar transposition using the following rectangles: ■ 

For the rows; For the columns: 



HDRLC 
B F G J K 
M N P Q S 
T V W X Z 



Q S T N B L 
C D F G H J 
KHPRVW 
X z 



Thus the key words for the first period are HYDRAULIC and QUESTIONABLY (with, 
of course, the vowels omitted) for the row and column coordinates, respectively. 

IV - CONTINUITY OF KEY CHANGES; SUMMARY 

16, Having solved the CALOX system for the first period (12-18 Dec), the second 
period (19-26 Dec) was easily solved by the discovery of a pair of cross-key isologs on 
19 December; the third period (27-31 Dec) was speedily solved by means of a signature 
crib; while the fourth period (beginning on 1 Jan) had to be solved by the general method 
of digraphic frequencies and digraphic idiomorphs. The row and column key words for 
the second period were COPYRIGHTED and DOCUMENT; for the third period, CHIMPANZEE 
and MANDRILL; but for die fourth period the same key word, MNTVD (Montevideo?), was 
used for both die row and column coordinates. The coordinate sequences were derived by 
simple columnar transposition, as in the first period. 



10-12 



CONFIDENTIAL 







REF ID: A56895 



CONFIDENTIAL 



17. If the enemy has found that two different sequences for the row and column 
coordinates is too inconvenient cryptographically and therefore continues to use the single 
key word procedure started ill the fourth period, a statistical technique has been devised 
for establishing the identity of some (or even all) of the letters of the coordinates, based 
on a consideration of the relative frequencies of die ciphertext letters. Tills technique 
is founded on the fact that in a single key word procedure the combination of row 19 and 
column 19 of the basic matrix will yield a low frequency cipher letter, as will the 
combinations of row 20-column 20, and row 9-column 9; on the other hand, the combi- 
nations row 17-column 17, row 5-column 5, row 13-column 13, and row 14-column 14 
will yield high frequency cipher letters. With a single key word procedure being used, 
the following is the expected descending frequency order of the twenty row-column 
combinations: 



17 5 13 14 1 8 18 15 4 3 12 16 G 11 7 10 2 9 20 19 

Even if two key words are employed for the coordinates, a modification of the statistical 
method is feasible, m those instances where any difficulty might be encountered in a 
new key period. The statistical techniques and the methods of their employment wdl be 
described in a later report. 

18, No trouble is anticipated in keeping current with key changes in the CALOX 

system; traffic should be readable now on the first day of a key change. If die enemy used 
another set of 5 letters as nulls, instead of the vowels, the new nulls can be identified by 
searching for and examining near-repetitions, as shown in par. 11, A similar procedure 
would be used to identify a new number indicator, even though solution would not be 
impeded by this latter factor, 1 

19. The traffic analysis report on the CALOX traffic gives complete statistics on 
the links on which CALOX is found, as well as a detailed summary on the number of mes- 
sages intercepted, etc. 



\ 



CONFIDENTIAL 



10-13 



CONFIDENTIAL 



REF ID : A56895 



(blahk) 



REF ID: A5 68 95 



, "faAjJ k * 



- CQNFIDENTTA t r 



NATIONAL SECURITY AGENCY 
- - Washington 25, D. C. 



COURSE 
LESSON 8 

‘ - • l . V 

TEXT ASSIGNMENT 



Military Cryptanalysis, Part I 

i - - 1 - 

Monoalphkbetic substitution with 
irregular -length cipher units; 
monome -dinome systems and others 

Section X 



V/ *- 4 » 



1. Solve the following monome -dinome cryptogram and recover the 
original matrix: 



78131 


7 6 7 8 4 


31174 50078 


7 6 3 4 3 


47807 


4 13 4 6 


5 3 3 3 4 


0 13 3 1 0 17 9 9 


7 8 3 1 8 


7 6 4 4 1 


3 19 17 


92478 


a . • ¥ 

74179 10834 


7603 3 


5 5 7 2 3 


40178 


3 13 4 7 


46554 65323 


4 13 0 5 


86131 


3 M 6 7 


3 0 3 4 5 


7 7 7 8 7 4 8 7 6 3 


7 7689 


76072 


7 6 7 4 7 


8 8 12 3 


11278 31788 


76503 


4 7 7 5 3 


17807 


6 7 9 2 1 


0 7 2-7 6 07 3 10 


'l 7 9 9 7 


88878 , 


7 4 7 0 3 


0 5 3 2 3 


1 * 'i ^1 ii 7 TT r ; 7 v - - "” 

1 5777.. 7 1034 

m, A -V 


7 V 3 7 1 


*3 3 7 6 4 


47117 


37607 - 


88390 00 6 " 6 IT 


“ 3 3 3 0*0 


0 3 9 8 5 * 


7 9 5 3 1 


3 15 3 3 

V . 


7 8~3 4 2 47800 

1 - * ■ ' -0 ■< _ - 


•1 7 2 3 0 


7 5560 


3 4 8 5 0 


• « 4, 

7 4 5 4 7 


^ j. *± \ ' _ 

83189 






• i-*. . 

J 


- H 

f “ * * 


X ^ J l* 


"V* "V' •- _ 

VJ 


- • V 


U. 

" Vl • 


. ‘ ? » > 


/ i. v* f • Am j 

r .. 4 * i f ; • ? , “ 


*;• - T •' 


' ‘ 


4 


A 


» £ s r * ' '* 

j *■ * 1 « j » ’ 

* f *- i * * • . V**. 


- 


1 ▼ 


- - . 


¥ 


— - « '7*“ 


T 




1 1 


- a 

a 1 •" jT ■ 1 « 1 ^ 

- ■ » * • *• 




. i 



COMFIDENTIMr 



1 



CONFIDENTIAL 



REF ID : A56895 



2 . The following monorae -dlnome cryptogram la believed to contain the 
probable word "DIVISION”. Solve the text and recover the original matrix: 



17832 


0 0 0 6 6 


16927 


80635 


2 8 4 2 0 


0 4 5 9 6 


95220 


01900 


2 15 0 0 


40563 


2 6 7 4 6 


1 2 5 7 6 


80705 


88123 


5 3 9 2 1 


3 1118 


1 3 2 8 1 


2 9 15 9 


4 6 4 6 5 


61576 


5 2 8 4 4 


9 0 0 3 3 


9 4 5 2 6 


5 9 4 0 0 


2 5 2 8 4 


3 0 0 3 2 


00457 


80758 


80707 


0 0 5 2 6 


7 3 9 4 1 


2 0 8 5 4 


5 6 6 4 0 


5 9 3 5 2 


9 16 2 5 


9 7 6 1 2 


4 6 9 7 7 


89125 


0 5 9 4 5 


2 2 0 0 8 


4 1 4 0 1 


5 112 9 


3 17 0 2 


91067 


5 3 7 6 3 


59062 


3 8 0 7 1 


6 7 0 0 3 


8 4 6 7 0 


0 4 2 6 7 


7 8 5 7 9 


2 0 0 8 4 


17 9 19 


6 0 2 6 6 


4 3 5 9 5 


6 5 6 9 7 


00036 


1 2 0 0 4 


9 7 6 1 6 


8 7 2 0 2 


6 0 0 4 5 


70787 


0 5 9 7 1 


2 6 12 2 


8 12 0 0 


1 9 0 0 3 


0 0 8 4 1 


76912 


0 9 5 9 9 


7 2 6 7 3 







3 . The following cryptogram was intercepted on a link which has been 
known to be passing traffic in two different monome -dlnome systems, one 
Involving a matrix of the type shown in Fig. 75 of the text, the other 
Involving a matrix of the type in Fig. 77 • Solve the text of the message 
and recover the original matrix. 



4 7 6 3 1 


82870 


1 4 6 2 8 


3 12 7 4 


1 2 7 4 1 


1 6 2 6 3 


16054 


63152 


8 4 6 6 2 


6 0 7 3 6 


97728 


46198 


4 6 9 7 2 


13808 


4 6 2 8 7 


4 6 3 6 4 


83788 


7 2 8 4 6 


6 0 8 4 6 


28738 


2 7 5 7 8 


87073 


1 8 2 7 9 


6 2 7 3 6 


9 7 4 6 2 


83107 


3 6 9 7 7 


4 5 6 3 6 


2 6 9 6 2 


7 3 16 8 


6 2 7 6 3 


12138 


0 8 4 6 2 


8 7 3 1 6 


0 6 3 7 9 


82647 



2 8 4 6 7 



CONFIDENTIAL 



2 




_ \ _REF ID :A56895 - 

CONFIDENTIAL 

4. The following messages, intercepted on a link known to he passing 
monome-dinome traffic, are believed to be isologs. Solve the texts and re- 
cover the original matrices. * ‘ ' 

Message "A" 



9 4 8 7 2 


3 3 9 3 5. 


61227 


8 9 3 1 6 


23405 


0 9 0 7 9 


43810 


5 7 6,7 8. 


9 3 .3 8 6 


4 1 9 9 9 


83809 


08334 


9 4 19 4 


76279 


99496 


3 0 5 7 6 


79 1.9,9 


5 4 3 4 3 


5 7 6 8 3 


0 4 1 8 6 


07981 


4 3 3.4 9 


83 5 2 9 

\ % * 


09638 


— 




Message "B" 






9 4 3 7 8 


119 3 5 


62887 


3 93 26 


8 1 4 0 5 


0 9 0 7 9 


4 13 2 0 


5 7 6 7 3 


931.36 


4 19 9 9 

1 4 n w 


81309 


0 3 114 

t ‘ 1 


9 4 19 4 


7 6 8 7 9 


99496 


10576 


7 9 19 9 


5 4 3 4 3 


5 7 6 3 1 


0 4 1 3 6 


0 7 9 8 2 


43149 


3 15 8 9 


09613 




J i - * _ 9 



CONFIDENTIAL 



3 



REF ID : A56895 



C ONFIDE NTIAL 



5. The following messages are believed to be isologous monome- 
dinome ciphers. Solve the texts and recover the original matrices: 

Message "A" 



7 3 5 0 7 
14 9 8 3 
3 0 7 4 1 
3 0 4 1 5 
5 19 8 3 
16361 

0 7 9 0 1 

3 5 0 3 9 

3 6 7 1 3 

5 6 2 9 6 
43072 
72171 

6 2 9 6 8 
3 4 3 3 9 

7 4 2 9 2 
7 4o65 



09885 

12316 

59012 

6 5 0 7 5 
12316 
8 0 7 7 2 
10 12 1 
0 4 3 9 8 

4 5 8 0 7 
8 9 2 1 6 

7 4 2 9 2 
3 2 5 6 4 
9 2 1 6 3 
7 3 4 8 4 
7 8 0 1 7 



01652 
5 2 3 7 1 
5 4 3 9 8 

43098 
5 2 3 7 1 

9 7 0 5 6 

98617 



18921 

3 7 7 9 8 
5 6 5 7 1 
58871 

7 7 6 7 6 
9 7 4 2 4 
0 8 4 6 5 



3 7 5 3 1 
12890 
50563 
1 3 5 0 0 
1 3 5 5 9 
29092 

5 6 3 9 8 



63867 
0 7 4 8 5 
8 4 6 5 0 
4 3 0 6 3. 
85629 
81798 
26896 



09804 

9 3 3 1 2 
9 8 4 6 0 
7 4 3 7 9 
3 3 12 4 
58145 
9 4i63 



55406 
62909 
1 4 3 3 9 
74180 
06509 
7 2 5 1 7 
80036 



3 9 8 5 8 

42689 

7 7 2 9 7 

0 6 8 1 4 

3 9 8 4 2 

1 5 4 6 5 ' 

8 4 7 3 1 



5 8 17 9 
18085 

7 3 6 4 0 
7 9 8 7 5 
89612 
1 3 7 4 7 
88716 



Message "B 1 



4 



CONFIDENTIAL 




” - REF ID: A5 6 8 95 

CONFIDENTIAL 

4 . The following messages, intercepted on a link known to he passing 
monome-dinome traffic, are ‘believed to he isologs. Solve the texts and re- 
cover the original matrices. 

- * “ w » _ -» »_ z « - . * . , 

Message u A n 



9 4 8 7 2 


3 3 9 3 5 


6 12 2 7 


89316 


2 3 4 0 5 


09079 


4 3 8 1 0 


5 7 6 7 8 


9 3 3 8 6 


4 19 9 9 


8 3 8 0 9 


08334 


9 4 19 4 


76279 


99496 


3 0 5 7 6 


7 9 1 9 9 


54343 


5 7 ,6 8 3 


0 4 18 6 


0798 l 


4 3 3,4 9 


8 3.5 2 9 


09638 


! 1 




^"Message "B" 




* s. 


94378 


119 3 5 


62887 


3 9 3 2 6 

» » * » 


8 1 4 0 5 

, » ♦ 


09079 


4 13 2 0 


5 7 6 7 3 


9 3 13 6 


41999 


81309 


0 3 114 


9 4 19 4 


7 6 8 7 9 


99496 


10576 


7 9 19 9 


5 4 3 4 3 


5 7 6 3 1 


0 4 13 6 


07982 


43149 


31589 

- « ? 

‘ 1 *■ 


09613 

• 1 


— A . 




_i U .r kr 

M * .1 . Jl 

-W*J t * * ,■*» 


• l a - 

’ — V 

* * 

-- ■* *7' 


^ ; 1 c 

<* ^ 

• 


t * 


f 


1 k ^ ' 


\ ‘ 1 f .' 5 ' 


r- - ^ >** * *• 


; 


. .. 



CONFIDENTIAL 



3 



REF ID : A56895 



CONFIDENTIAL 



5. The following messages are believed to be isologous monome- 
dinome ciphers. Solve the texts and recover the original matrices: 

Message "A" 



7 3 5 0 7 
1 4 9 8 3 
3 0 7 4 1 
3 0 4 1 5 
5 19 8 3 
1 6 3 6 1 
0 7 9 0 1 
3 5 0 3 9 



09885 
12 3 16 
5 9 0 1 2 
6 5 0 7 5 
12 3 16 
8 0 7 7 2 
10 12 1 
0 4 3 9 8 



0 16 5 2 
5 2 3 7 1 
5 4 3 9 8 

4 3 0 9 8 

5 2 3 7 1 
9 7 0 5 6 
9 8 6 1 7 



3 7 5 3 1 
1 2 8 9 0 
5 0 5 6 3 
1 3 5 0 0 

1 3 5 5 9 

2 9 0 9 2 
5 6 3 9 8 



0 9 8 0 4 
9 3 3 1 2 
9 8 4 6 0 
7 4 3 7 9 
3 3 12 4 
58145 
9 4 16 3 



3 9 8 5 8 

42689 

7 7 2 9 7 

0 6 8 1 4 

3 9 8 4 2 

1 5 4 6 5 ' 

8 4 7 3 1 



Message "B" 



36713 458 

56296 892 

43072 742 

72171 325 

62968 921 

3 4 3 3 9 7 3 4 

74292 780 

7 4 0 6 5 



0 7 


18921 


1 6 


3 7 7 9 8 


9 2 


5 6 5 7 1 


6 4 


58871 


6 3 


7 7 6 7 6 


8 4 


9 7 4 2 4 


1 7 


0 8 4 6 5 



63867 554 

07485 629 

84650 l 4 3 
4306i 741 

85629 065 

81798 725 

26896 800 



06 58179 
09 18085 

39 73640 
80 79875 
09 89612 
17 13747 
36 88716 



CONFIDENTIAL 



4 




REF ID : A56895 



CONFIDENTIAL 



6. Solve the following monome -dinome -trlnome cryptogram and recover 



the original matrix: 










6 17^5 


0 4 12 0 


4 3 9 5 0 


4 3 2 3 8 


6 5 3 3 2 


0 6 3 8 2 


0 15 0 3 


2 0 6 8 2 


616 6 1 


2 0 4 3 6 


5 3 5 1 3 


17 15 0 


6 8 4 12 


1 9 2 0 3 


1 6 2 0 4 


3 8 5 4 3 


1 2 0 4 3 


2 0 15 0 


3 5 3 5 0 


1 2 3 3 5 


4 5 0 3 9 


4 4 17 1 


2 0 18 6 


5 0 9 2 9 


78509 


2 3 8 5 0 


4 6 2 0 4 


8 4 7 3 9 


4 5 0 4 9 


6 2 0 6 5 


8 2 8 2 0 


4 3 5 3 2 


01561 


9 3 2 3 1 


6 5 1 8 4 


7 15 3 3 


5 3 8 4 2 


0 4 5 4 1 


6 2 4 5 3 


3 2 0 4 3 


8 5 4 2 1 


6 8 5 6 4 


7« . Solve the following unillteral -biliteral cryptogram, and recover 
all keys: 


P V 0 Y A 


C K R T E 


A U 0 0 D 


K N W 0 I 


BKEIA 


U B T A P 


W 0 I D 0 


OBKRT 


A E N X B 


T A E B G 


Y A E U I 


ENLCT 


EOBZF 


H 0 OB L 


YIEBO 


U U 0 N T 


B X P X R 


MIBKA 


C W 0 I E 


P KC 0 P 


V A Y E P 


TE1BM 


PKSGE 


Y A 0 D K. 


UEDLR 


Z E Y A H 


0 C W U Y 


A'TIPKP 


M E 0 I A 


C V P W Y 


R W 0 Y C 


W A P W 0 


I Y A 0 R 


W.s V C H 


E I R V C 


KYYPK 


0 I C K Y 


H W 0 D H 


R K D 0 E 


A E B X U 


EBXBH 


E Y A B T 


E U C W R 


0 R T D W 


PH 0 A 0 


POUDG 


R K C V Y 


0 K Z B 0 



U EH T X 



CONFIDENTIAL 



5 




REF ID : A56895 



CONFIDENTIAL 

8. The following c ry p t ogram, enciphered In a Playfair -type di- 
graphic -monographic system, is suspected to begin with the probable 
stereotype "MORNING REPORT FOR MONDAY NOVEMBER TWENTY FIRST." Solve 
the text and recover all keys. 



A Q T I N 


J F Q H Q 


PTLOP 


TAQ8K 


I V A T X 


C J E H Q 


FZKHB 


ZOEIB 


PEPPQ 


QTDHK 


HLROP 


TBVBZ 


P Z P R 0 


L V T P 0 


0 AEEQ 


M P 0 A Y 


QMEHF 


K R R K Q 


HQKKH 


RJHPH 


B J C HD 


K Z Y8 R 


KQBCA 


K QR Y Q 


MCQ6G 


AEEQN 


PRYQN 


Q X 0 L V 


QIJTE 


MQKED 


A H C T M 


K Q V 0 0 


AEEQT 


A X Q V P 


K M R J N 


P H E J C 


M D K Z Y 


3BXLT 


LOCKX 


C X K T P 




« 



9. The following cryptogram was enciphered in a dinome -trinome 
digraphic system employing matrices similar to those in Figs . 90a and 
b, except that the Internal numerical sequences have been changed. The 
message is suspected to end with the signature VINCENT ANDERSEN COL INF. 
Solve the text and reconstruct the matrices Involved. 



71665 


7 3 3 3 0 


1 3 9 2 


2 5 2 2 1 


3 9 2 2 5 


8 6 7 6 5 


0 18 0 2 


6 0 9 4 0 


4 4 26 3 


12 5 14 


47303 


6 0 7 3 3 


9 6 10 4 


7 0 2 7 3 


7 2 0 2 7 


5 3 0 7 2 


8 5 7 3 5 


3 9 5 1 8 


4 2 3 0 1 


0 7 8 2 4 


2 2 13 2 


Y1923- 


5 19 0 3 


5 1 6 6 3 


9 2 5 6 9 


0 9 4 0 2 


7«709 


*► 0 3 5 3 


01078 


2 19 4 6 


9 5 7 5 5 


85962 


4 2 2 1 3 


* 7 1 9 7 


65187 


2 6 7 5 2 


7 4 0 9 7 


5 5 7 3 4 


86919 


61182 


81051 


0 2 7 1 9 


85196 


5 7 3 9 2 


2 0 0 8 5 


3 2 5 3 6 


7 5 17 1 


9 2 5 7 7 


6 3 4 9 4 


3 5 2 3 4 


4 5 067 


1 9 3 4 9 


22522 


0 4 7 1 4 


4 1 0 4 5 


2 2 2 1 6 


5 7 5 08 


1 7 5 3 7 


16223 


9 3 14 4 


24586 


3 4 9 4 4 


8 2 5 0 6 









CONFIDENTIAL 



6 




CONFIDENTIA L 



REF ID : A56895 _ 



v 

. . - l f* 



10. The following cryptogram, based on a Morse code system, is sus- 



pec ted to begin with a 


spelled-out 


number. Solve it and recover all ] 


7 1^30 


62809 


1 8 5 9 2 


3 5 6 0 7 


6 15 7 2 


0 4 9 5 3 


7 9 0 1 2 


8 7 5 4 8 


6 5 9 8 3 


0 4 0 3 7 


9 5 3 2 7 


3 0 7 . 5 1 


3^904 


5 6 5 6 4 


2 0 8 1 3 


0 1258 


1 6 4 0 8 


9 7 15 6 


6 4 5 9 7 


6 0 4 1 0 


8 3 15 9 


3 4 7 0 2 _ 


68032 


9 5 3 5 7 


2 5 17 3 


02589 


4 15 8 2 


60360 


9 17 5 4 





•' > * 



rONFTDFNTIAL 



7 






REF ID : A56895 



CONFIDENTIAL 



(blank) 



CONFIDENTIA L 




REF ID: A5 68 95" 

mm- 



2* The following three messages were selected from a volume of 
Converter M-209 traffic because they were enciphered with the same 
message indicators, a serious violation of cryptographic security. 

It is furthermore suspected that stereotypic beginnings may have 
been used in the drafting of the three messages. Solve the messages, 
and submit the plain text to Message "A". 



Message "A” 



E E L 0 


U 


I S E L 


C 


Z YSXL 
H 0 


S R M 


C 


X 


U 


XKK 


K 


X T F C 


S 


J G L N 


0 


IJNaF 


R U Z 


T 


T 


N 


0 M K 


P 


M M D P 


E 


K I H S 


R 


J H V Z C 


C F C 


0 


H 


Z 


N B T 


D 


K Q M M 


G 


EELO 


U 


ISELC 























Message "B 1 


ii 














EELOU 


I 


SEE 


i T 

E 


C Z G E 
E >J 


V 


E G 


L J X 


Z 


U 


D T 


0 


M Y W M W 


B 


C X V 


K 


D K C Z 


u 


R B 


ABO 


A 


B 


L S 


Z 


I Y L S C 


S 


R R W 


P 


ISON 


w 


E E 


LOU 


I 


S 


E E 


E 







Message "C" 








EELOU 


ISELC 


P I F M C 


Z I J 


Y P 


B H W G K 






R t' F £ A- 


C VC 


e 




W Z E B y/ 


B X Q I B 


D V W U E 


Z K K 


T P 


DKHXT 


EEYAE, 


D V E G L 


B D I R P 


K T S 


G 0 


M J Z Z F 



EELOU ISELC 






2 



CONflDCNT I /M r 



SECURITY INFORMATION 



1 


12 2 3 3 4 4 

60 5 0 5 01 






A 


YDSQPKBLAJNCGMWEZXGUROIHFV 


A 


YDSQPKBLAJN C©M WE Z X® U ROIHPV 


B 


IQLJ$GDAU*RHKFECBWNXMVZOSY 


T 


WZETRQLCMBKO D(g)N X F A Y<g>V SP JIG 


C 


RVBLTOMVJGDXWUKNSHFEZQAPYC 


N 


hxafusrmonclpe®oygbz(Dwtqkj 


D 


Z JRKKTHEB7U S ILQFDCXOYNWAPT 


1 


KIYBGVTSNEODMQ F@P Z H C P .( 3 )X URL 


E 


AETXDNVQQXLIFZYWMPUJHGBSCR 


J 


MLJZCHWUTQFPENRGKQAIDBKYVS 


F 


FWGVEIXBHRZU SBPMJDCAQTYNLK 


Q 


TNMKADIXVUPGQFOSHLRBFECLZW 


G 


LGXHWFJYCISAVTCQN*EDBRUZOM 


X 


XUONLBEJYWVQHRGPTIMSCKFDMA 


H 


SBFUYEOWRPYMJGAZXNQVKIHCTD 


M 


BYVPOMCFKZXWRISHQUJNTDLGEN 


I 


XIYBGVTSNEODMQFJPZHCAJXURL 


Z 


OCZWQPNDGLAYXSJTIRVXOUEMHF 


J 


MLJZCHWUTOFPENRGKQAIDBXYVS 


L 


GPDAXRQOEHMBZYTXUJSWLPVFN I 


[1 


XUONLBEJYWVQHRGPTIMSCKFDMA 


S 


JHQEBYSRPFINCAZULVKTXMQWG 0 


L 


GPDAXRQOEHMBZYTKU JSWLPVFNI 


X 


PKIRFCZTSQGJODBAVMWLUYNRXH 


M 


BYVPOMCFKZXWRISHQUJNTDLGEN 


B 


IQLJSGDAU*RHKPECBWNXMVZOSY 


N 


HXAFUSRMDNCLPEIOYGBZIWTQKJ 


m 


ZJRMKTHEBVUSILQFDCXOYNWAPT 


0 


NMHYIXGKZDJTBWU DROLFECSVAP 


R 


UAKSNLUIFCWVTJMRGEDYPZOXBQ 


P 


V F U D H W A'g QYTRAOLIC*ZPSXKKJE 


C 


RVBLTOMVJGDXWUKNSHFEZQAPYC 


‘S' 


TNMKADIXVU PGQFOSHLRBFECLZW 


U 


DSWCMUPNWKHEYXVLOTIGFARBQZ 


R 


UAKSNLUIFCWVTJMRGEDYPZO.XBQ 


E 


AETXDNVQOXLI FZYWMPUJHGBSC R 


S 


JHQEBYSRPFIKC AZULVKTXMQWGO 


H 


SBFUYEOWRPYMJGAZXNQVKIHCTD 


T 


WZETRQLCMB KODHNXFAYHV SPJ IG 


ES 


ETCGVZFPXSQZNKHBAYORWLJ IDU 


U 


DSWCMUPNWKHEYXVLOTIGFARBQZ 


p 


VFUDHWAGQYTRAOLIC*ZPSXMKJE 


V 


ETCGVZFPXSQZNKHBAYORWLJIDU 


F 


FWGVEIXBHRZUSBPMJDCAQTYNL K 


w 


Q 0 N I ZJYHL#EKU CX VESPMGFDTWB 


G 


LGXHWFJYCISAVTCQN*EDBRUZOM 


X 


PKXRFCZTSQGJ OOBAVHWLU YRRXH 


0 


NHHYIXGKZDJTBWUDROLFECSVAP 


Y 


CRPOJ AXZIMBFLVDYWFTQNHGEUX 


W 


QONIZJYHL*EKUCXVESPMG FDTWB 


Z 


PKIRFCZTSQGJODBAVM'WLUYNRXH 


Y 


CRPOJAKZIMBFLVDYWFTQNHGEU X 


-ts* 


OCZWQPNDGLAYXSJTIRVKQUEMHF 







Fig 1 . Enciphering alphabets 16-41 - Purple values 
consitute the partial alphabets obtained through depth 
reading; red values are derived by examination of the 
basic c .pher=*text sequences (using the entire set of 
100 partial alphabets) - 



Fig 2 ., The Friedman square for the fast 
rotor, obtained by rearranging the rows of 
Fig 1 (using the isomorphic patterns of the 
rows) so as to yield identical sequences for 
all the diagonals. 



CONFIDENTIAL 









16 42 63 94 



5 

aJ 

5? 



A 

B 

C 

D 

E 

F 

G 

H 

I 

J 

K 

L 

M 

N 

0 

P 

Q 

R 

S 

T 

U 

V 

W 

X 

y 

z 



Ys W P A 


A 


l\l S I 


B 


R C X H £ 


C 


Z N F T 


D 


A X Y L 


E 


F T A W 


F 


L P K S 


G 


S E B M 


H 


K V Z 0 


I 


MsG L U 


J 


X \ Q N 


X 


G AX) C 


L 


B Q T G 


M 


H D U X 


N 


WORE 


0 


V Y W D 


P 


T L J H 


Q 


U K E P 


R 


Jkl G V 

w\c J 


S 

T 


B s n h y! 


U 


E R V K 


V 


Q Z N F 


W 


P U X Q 


X 


C B I B 


Y 


0 F D Z 


Z 



IMP 
I JS 
ROM 
ZHPH 
A X Y 
F T A 
LPK 
S E B 
K V Z 
HGL 
X H Q 
GAO 
B Q T 
H D U 
NOR 
V Y W 
T L J 
UKB 
JIG 
W M C 
D S H 
E R V 
Q Z N 
P U X 
G B I 
0 P D 



W 



E 



F 



B 



R 



N 



Fig 3 o Enciphering alphabets 16, 42. 68, Fig 4 A fragment of the Friedman square for the 

and 94o These alphabets, spaced at intervals medium rotor, with one of the repeating diagonals ex- 

of 26 along the keying cycle, resulted from tended < 

four successive positions of the medium rotor 
at points along the cycle where the fast rotor 
had returned to its initial position.. Note 
that a diagonal chain may be completed, using 
alphabets 16, 42, and 68. 




ENCIPHERING ALPHABETS, "ZEBAB" PROBLEM 



1 1 2 2 3 3 4 4.5 

5050505050 
A|V T J M R G E D Y P Z QYDSQPKBLA NC MW E Z X G U R 0 HFVWZETR L C m!a 

B LJ HKPE X 7 OS SR B 

CZ KHB Y 0 R W ID R L OM JG XWU NSHFEZ P-YCCRP J ZIC 
DQH GPT MSCKF ZJ KT EB LQF CXOYNW P NMHYIXGKZD 

BFLVDYWFTQNHGEUXAETXDNVQOXL FZYWMPUJHGBSCRXUONLBEJYE 

9 FRAOL PSX JEFWGVE B R S PMJ C TYN K K DI F 

GOHXF H PJ XHFJYC A V T C BRUOM R Z C- 

KG Q SH RB ECLZW F EOW M G X Q? I T VZP XH 

IN AZULV TXMQWGOKIYBGVTSNEODMQFJPZHCA XURLV U DHWAGQI 
J R J 

IViyiK E K K 

,L ODB VM XH QOEHM TX J5WLP NIA T DN OL 

HP N 'GKQ D V BYVPO CFXZXWRISH U TDLG HQ I YH M 

N WUKN H F E Z Q A P Y C H X A F U S R M D N C L P E I 0 Y G B Z I W Q K J D S W C M U P N W N 

0 JGAZX VXIHCTDNMHYI G K Z D J T B W U D R 0 L F E G V A P 0 C Z W Q P N D G 0 

PIFZYWM UJ GBSC F DHW QYTR LI S K 3Q X L P 

Q CVS K V G S Q 

RCGMWEZXGURO H F V U A K S N L U I F C W V T J M R G E D Y P Z 0 X B Q K I Y B VTSNR 
^ SY SJ IR KO EMHFJHQEBYSRPFINCAZULV T X M Q W G 0 I Q L J S G AUS 
WR S QU JNTDLGENWZETRQLCM KODH XFAYH SPJIGMLJZCHWUT 



A V C N EDB Z 
Y X S P F 
U J L 

X 

B W Q X 



Z MD WCMUPNWKHEYXV 
F E F 

L 



0 IGF RBQZSBF YE R 
Y IV V 

S P D R T B 

L I 

G U Y 0 F 



W 

WUD OLFECSVAPOCZWQPNDGLAYXSJTIRVXOUEMHFFWGVEIXBH 








NATIONAL SECURITY AGENCY 
Washington 25, D. C. 



"TAN" PROBLEM 

(A problem in plaintext recovery from a shallow depth In a Baudot 
system) 



Training Division 
9 November 1953 



International Teleprinter Code 



UPPER 

CASE 


weather symools 


D 


0 


0 


B 


□ 


B 


B 


B 


□ 


a 


B 


B 


. 


□ 


□ 


□ 


B 


□ 


□ 


□ 


B 


0 


B 


B 


□ 


B 


B 


H 




Ui 

O 

2 

i/i 


h- 

u. 

5 

a 

tj 


t 

5 

C 


COMMUNICATIONS 


0 


y 


B 


□ 


□ 


U 


□ 


□ 


□ 


S 


B 


B 


• 


B 


□ 


□ 


B 


□ 


□ 


□ 




B 


a 


a 


□ 


H 


□ 


El 


E 


LOWER CASE 


D 


i 


a 


a 


D 


D 


D 


D 


D 


B 


B 




B 


1 


B 


I 


B 


fl 


B 


B 


B 


fl 


b 


a 


fl 


Z 


1 


a; 

o 


| 




1 


□ 


B 


B 


□ 


B 


□ 


B 


fl 


B 


□ 


B 


B 


fl 


B 


B 


B 


□ 


B 


B 


B 


□ 


B 


Q 




□ 


o 


fl 




fl 


fl 


□ 


□ 


z 


• 




o 






B 


B 




B 


B 


B 


B 


_ 


_ 




□ 


B 


B 


B 


Z 


B 






B 




B 


B 




O 


i 


B 


□ 


FEED HOLES 


□ 


a 


□ 


□ 


□ 


B 


□ 


□ 


5 


□ 


□ 


□ 


□ 


P 


□ 


□ 


□ 


□ 


a 


□ 


□ 


□ 


M 


□ 


□ 


□ 


0 


o 


o 


□ 


□ 


□ 


3 


■ 


u 


0 


B 


B 


B 


B 


0 


0 


B 


B 


B 


0 


B 


B 


B 


B 


B 


B 


B 


B 


B 


fl 


B 


o 


J 








B 


B 


B 


4 


■ 


a 


0 


B 


B 


B 


i 


B 




B 


B 




0 




B 


B 


B 




B 


B 


B 


B 


B 


o 




fl 




O 






B 


□ 


5 




0 


B 


B 




B 


B 


B 




B 


B 


B 


B 


B 


B 


B 


B 


B 


B 


B 


B 


121 


2 


o 


o 


0 






B 




B 


B 



Vernara Encipherment Table 



e 2 





A 


B 


c 


D 


E 


F 


G 


H 


I 


J 


K 


L 


M 


N 


0 


P 


Q 


R 


s 


T 


U 


V 


w 


X 


Y 


Z 


2 


3 


4 


5 


6 


7 


A 


4 


S 


L 


Y 


X 


Z 


I 


7 


G 


Q 


W 


C 


6 


T 


3 


R 


J 


P 


B 


N 


2 


5 


K 


E 


D 


F 


U 


0 


A 


V 


M 


H 


B 


S 


4 


7 


K 


U 


J 


M 


L 


6 


F 


D 


H 


G 


R 


V 


T 


z 


N 


A 


P 


E 


0 


Y 


2 


W 


Q 


X 


5 


B 


3 


I 


C 


C 


L 


7 


4 


0 


T 


M 


J 


S 


Q 


G 


V 


A 


F 


X 


D 


U 


i 


2 


H 


E 


P 


K 


5 


N 


3 


6 


R 


Y 


C 


W 


Z 


B 


D 


Y 


K 


0 


4 


Q 


2 


N 


5 


T 


X 


B 


3 


R 


G 


C 


6 


E 


M 


W 


I 


Z 


7 


S 


J 


A 


U 


F 


L 


D 


H 


P 


V 


E 


X 


U 


T 


Q 


4 


W 


3 


R 


0 


Y 


Z 


N 


5 


L 


I 


7 


D 


H 


2 


C 


B 


6 


F 


A 


J 


K 


S 


G 


E 


M 


V 


P 


F 


Z 


J 


M 


2 


W 


4 


7 


I 


H 


B 


X 


6 


C 


V 


R 


3 


S 


0 


Q 


5 


Y 


N 


E 


K 


U 


A 


D 


P 


F 


T 


L 


G 


G 


I 


M 


J 


N 


3 


7 


4 


Z 


A 


C 


R 


Q 


B 


D 


X 


W 


L 


K 


6 


Y 


5 


2 


P 


0 


T 


H 


V 


E 


G 


U 


S 


F 


H 


7 


L 


S 


5 


R 


I 


Z 


4 


F 


6 


3 


B 


Q 


U 


W 


X 


M 


E 


C 


2 


N 


Y 


0 


P 


V 


G 


T 


K 


H 


D 


J 


A 


I 


G 


6 


Q 


T 


0 


H 


A 


F 


4 


L 


P 


J 


S 


Y 


E 


K 


C 


W 


M 


D 


V 


U 


R 


3 


N 


7 


5 


X 


I 


2 


B 


Z 


J 


Q 


F 


G 


X 


Y 


B 


C 


6 


L 


4 


2 


I 


7 


0 


N 


5 


A 


V 


Z 


3 


W 


R 


U 


D 


E 


S 


K 


T 


J 


P 


H 


M 


K 


w 


D 


V 


B 


Z 


X 


R 


3 


P 


2 


4 


5 


N 


M 


7 


I 


U 


G 


Y 


6 


Q 


C 


A 


F 


S 


E 


J 


H 


K 


L 


T 


0 


L 


C 


H 


A 


3 


N 


6 


Q 


B 


J 


I 


5 


4 


Z 


E 


Y 


2 


G 


U 


7 


X 


R 


W 


V 


T 


0 


M 


P 


D 


L 


K 


F 


S 


M 


6 


G 


F 


R 


5 


C 


B 


Q 


S 


7 


N 


Z 


4 


K 


2 


Y 


H 


D 


I 


W 


3 


X 


T 


V 


p 


L 


0 


U 


M 


E 


A 


J 


N 


T 


R 


X 


G 


L 


V 


D 


U 


Y 


0 


M 


E 


K 


4 


J 


S 


3 


B 


P 


A 


H 


F 


6 


C 


I 


5 


7 


Q 


N 


Z 


W 


2 


0 


3 


V 


D 


C 


I 


R 


X 


W 


E 


N 


7 


Y 


2 


J 


4 


Z 


T ' 


F 


5 


Q 


6 


B 


H 


G 


L 


P 


M 


A 


0 


S 


U 


K 


P 


R 


T 


U 


6 


7 


3 


W 


X 


K 


5 


I 


2 


Y 


S 


Z 


4 


V 


A 


N 


B 


C 


Q 


G 


H 


M 


0 


L 


F 


P 


J 


D 


E 


Q 


J 


Z 


I 


E 


D 


S 


L 


M 


C 


A 


U 


G 


H 


3 


T 


V 


4 


5 


F 


0 


K 


P 


2 


Y 


X 


B 


W 


N 


Q 


R 


7 


6 


R 


P 


N 


2 


M 


H 


0 


K 


E 


W 


V 


G 


U 


D 


B 


F 


A 


5 


4 


T 


S 


L 


J 


I 


7 


6 


3 


C 


Z 


R 


Q 


Y 


X 


S 


B 


A 


H 


W 


2 


Q 


6 


C 


M 


Z 


Y 


7 


I 


P 


5 


N 


F 


T 


4 


R 


X 


3 


D 


U 


K 


J 


E 


V 


S 


0 


G 


L 


T 


N 


P 


E 


I 


C 


5 


Y 


2 


D 


3 


6 


X 


W 


A 


Q 


B 


0 


S 


R 


4 


7 


Z 


M 


L 


G 


V 


H 


J 


T 


F 


K 


U 


U 


2 


E 


P 


Z 


B 


Y 


5 


N 


V 


W 


Q 


R 


3 


H 


6 


C 


K 


L 


X 


7 


4 


I 


J 


S' 


F 


D 


A 


M 


U 


G 


0 


T 


V 


5 


0 


K 


7 


6 


N 


2 


Y 


u 


R 


C 


W 


X 


F 


B 


Q 


P 


J 


3 


Z 


I 


4 


L 


M 


H 


T 


G 


S 


V 


A 


E 


D 


W 


K 


Y 


5 


S 


F 


E 


P 


0 


R 


U 


A 


V 


T 


6 


H 


G 


2 


I 


D 


M 


J 


L 


4 


Z 


B 


X 


Q 


7 


w 


C 


N 


3 


X 


E 


2 


N 


J 


A 


K 


0 


P- 


3 


D -F 


T 


V 


C 


G 


H 


Y 


7 


U 


L 


S 


M 


Z 


4 


Q 


W 


B 


I 


X 


6 


5 


R 


Y 


D 


W 


3 


A 


J 


U 


T 


V 


N 


E 


s 


0 


P 


I 


L 


M 


X 


6 


K 


G 


F 


H 


B 


Q 


4 


2 


Z 


C 


Y 


7 


R 


5 


Z 


F 


Q 


6 


U 


K 


A 


H 


G 


7 


S 


E: 


M 


L 


5 


P 


0 


B 


3 


J 


V 


D 


T 


X 


W 


2 


4 


Y 


R 


Z 


N 


C 


I 


2 


U 


X 


R 


F 


S 


D 


V 


T 


5 


K 


J 


P 


0 


7 


M -L -W -C 


E 


H 


A 


G 


Q 


B 


Z 


Y 


4 


6 


2 


I 


3 


N 


3 


0 


5 


Y 


L 


G 


P 


E 


K 


X 


T 


H 


D 


U 


Q 


A 


F 


N 


z 


V 


J 


M 


S 


7 


I 


C 


R 


6 


4 


3 


B 


2 


W 


4 


A 


B 


C 


D 


E 


F 


G 


H 


I 


J 


K 


L 


M 


N 


0 


P 


Q 


R 


S 


T 


U 


V 


W 


X 


Y 


Z 


2 


3 


4 


5 


6 


7 


5 


V 


3 


W 


H 


M 


T 


U 


D 


2 


P 


L 


K 


E 


Z 


S 


J 


R 


Q 


0 


F 


.G 


A 


c 


6 


7 


N 


I 


B 


5 


4 


X 


Y 


6 


M 


I 


z 


P 


V 


L 


S 


J 


B 


H 


T 


F 


A 


W 


U 


D 


7 


Y 


G 


K 


0 


E 


N 


5 


R 


C 


3 


2 


6 


X 


4 


Q 


7 


H 


C 


B 


V 


P 


G 


F 


A 


Z 


M 


0 


S 


J 


2 


K 


E 


6 


X 


L 


U 


T 


D 


3 


R 


5 


I 


N 


W 


7 


Y 


Q 


4 



CONFIDENTIA L 














’ ."TAH" PROBLEM 



The following messages represent three radioprinter intercepts 
obtained on the same day. From analysis of prervious traffic, it is 
known that the first four letters of each message constitute the indi- 
cator; a single space is used between all words, and a message center 
idiosyncrasy is the use of the doubled CR CR LF LF for the carriage 
return-line feed operation. 

In the representation of the six special functions, the following 
notation has been used: 



Figures 2 
Space 3 
Letters 4 
Line feed 5 
Blank 6 



Carriage return 7 

It is suspected that one of the messages Intercepted in the morn- 
ing contains the probable vord REPORT. Solve the texts of the morning 
messages; and, after correctly juxtaposing the third message along the 
keying cycle, recover the plain text to the third message. 



Message "A” 



EDA BE IZX 


0930Z 


17 DEC 












IVIVP 


LWPZX 


EIT02C 


UBHVZ 


EEKWF 


mfn4f 

-P-e 


26SBK 

POJLV- 


XEB5F 


VD6F3 


CTOMV 


YEYUV 


QXI2H 


HCW5C 


KSK02 


YBIHC 


FHB5-TC 


C423G 


KXVTH 


I4AVS 


SUG06 










Message "B” 










EDA DE IZX 


0945Z 


17 DEC 












IVTVTI 


PEEKF 


F7CIU 


HUIAP 


EkVP7 


RIVEF 

fine 


UKGEII 

fc-YflU 


UZIW3ST 


GI2TY 


IZVEZ 


ud6us 


67 E 5 Z 


7YVLU 


XOOLZ 


GM42D 


DHHRC 


sq6ob 


4IGGM 


hq6mz 


S2?TQ 


4Y3CG7 


HISII 


























Message "C” 










IZX de RDA 


lh25Z 


17 DEC 












Bl-BMX 


XYY36 


mcj 


EESUh5 


IISI7C- 


EKLVZ 


3R7WE 


SAHJ5 


stzUg 


GEKSG 


VSU2S 


6fit4c 


L^HTP 


EUZB5 















CONFIDENTIAL 



REF ID : A56895